Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-7186
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7186.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7186", "datePublished": "2014-09-28T19:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-7186\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-28T19:55:06.223\",\"lastModified\":\"2024-11-21T02:16:29.170\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \\\"redir_stack\\\" issue.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de redirecci\u00f3n en parse.y en GNU Bash hasta 4.3 bash43-026 permite a atacantes remotos causar una denegaci\u00f3n de servicio (acceso a array fuera de rango y ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otro impacto no especificado a trav\u00e9s de el uso manipulado de documentos here, tambi\u00e9n conocido como el problema \u0027redir_stack\u0027.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4B4BB-C5A0-4283-9657-FC61BC95C014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972BDA0A-25C8-4C02-8624-07D2462C214C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A6E8C3-334D-443B-8AD6-F8A131490F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B631B7E-C59D-444F-80CE-DC2345A56E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C8E637-AD10-4854-AD60-A908D017DDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AB7456-89E4-4F40-82D0-EED52CAEE670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE919509-57B0-4D13-9503-943D5BFED620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F027515-A126-4899-B78E-121C8312002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC05A483-FAFD-4C40-85BC-D2EE907B2B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"097C61C9-4761-4D8F-9590-376FC1A5522B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA81069-36E0-4035-B31F-A5281E10C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC216C39-2EA0-4B58-87EA-81A737E5D2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88731DFF-B0B1-4325-A662-287D5E6E7265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA313D8-2B28-4C73-A96B-7814C37F0725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43630818-4A62-4766-AADC-AB87BE1C5553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"202B9DB4-80DC-4D1C-8DA8-C06E89FF542A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CB667F-26C8-46FA-81CE-1F6909AC006D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755984AB-D061-45F0-8845-D7B78BA506E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61711\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62228\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7186.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7186.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2014_1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5.9 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1865", "url": "https://access.redhat.com/errata/RHSA-2014:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1865.json" } ], "title": "Red Hat Security Advisory: bash Shift_JIS security update", "tracking": { "current_release_date": "2024-11-14T16:27:19+00:00", "generator": { "date": "2024-11-14T16:27:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1865", "initial_release_date": "2014-11-17T18:11:13+00:00", "revision_history": [ { "date": "2014-11-17T18:11:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-11-17T18:11:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:27:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "SJIS (v. 5.9.z Server)", "product": { "name": "SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:5" } } } ], "category": "product_family", "name": "RHEL S-JIS Service" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.src as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.src", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "relates_to_product_reference": "5Server-SJIS-5.9.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1306
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1306", "url": "https://access.redhat.com/errata/RHSA-2014:1306" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1306.json" } ], "title": "Red Hat Security Advisory: bash security update", "tracking": { "current_release_date": "2024-11-14T16:26:09+00:00", "generator": { "date": "2024-11-14T16:26:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1306", "initial_release_date": "2014-09-26T01:46:36+00:00", "revision_history": [ { "date": "2014-09-26T01:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T16:02:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.src", "product": { "name": "bash-0:4.1.2-15.el6_5.2.src", "product_id": "bash-0:4.1.2-15.el6_5.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.src", "product": { "name": "bash-0:4.2.45-5.el7_0.4.src", "product_id": "bash-0:4.2.45-5.el7_0.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.src", "product": { "name": "bash-0:3.2-33.el5_11.4.src", "product_id": "bash-0:3.2-33.el5_11.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=i686" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.x86_64", "product": { "name": "bash-0:3.2-33.el5_11.4.x86_64", "product_id": "bash-0:3.2-33.el5_11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.s390x", "product": { "name": "bash-0:3.2-33.el5_11.4.s390x", "product_id": "bash-0:3.2-33.el5_11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.i386", "product": { "name": "bash-0:3.2-33.el5_11.4.i386", "product_id": "bash-0:3.2-33.el5_11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.ia64", "product": { "name": "bash-0:3.2-33.el5_11.4.ia64", "product_id": "bash-0:3.2-33.el5_11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ppc" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.ppc", "product": { "name": "bash-0:3.2-33.el5_11.4.ppc", "product_id": "bash-0:3.2-33.el5_11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src" }, "product_reference": "bash-0:3.2-33.el5_11.4.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src" }, "product_reference": "bash-0:3.2-33.el5_11.4.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1312
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1312", "url": "https://access.redhat.com/errata/RHSA-2014:1312" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1312.json" } ], "title": "Red Hat Security Advisory: bash Shift_JIS security update", "tracking": { "current_release_date": "2024-11-14T16:26:22+00:00", "generator": { "date": "2024-11-14T16:26:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1312", "initial_release_date": "2014-09-26T21:28:16+00:00", "revision_history": [ { "date": "2014-09-26T21:28:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T15:08:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "S-JIS for Red Hat Enteprise Linux 6 Server", "product": { "name": "S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:6" } } }, { "category": "product_name", "name": "S-JIS for Red Hat Enteprise Linux 5 Server", "product": { "name": "S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:5" } } } ], "category": "product_family", "name": "RHEL S-JIS Service" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.src", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1354
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1354", "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-12-15T18:38:44+00:00", "generator": { "date": "2024-12-15T18:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2014:1354", "initial_release_date": "2014-10-02T18:40:05+00:00", "revision_history": [ { "date": "2014-10-02T18:40:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-02T18:40:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-M 3.4", "product": { "name": "RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:3" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-S-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "relates_to_product_reference": "6Server-RHEV-S-3.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1568", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2014-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1145429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1568" }, { "category": "external", "summary": "RHBZ#1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1568", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)" }, { "cve": "CVE-2014-6271", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2014-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1141597" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: specially-crafted environment variables can be used to inject shell commands", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6271" }, { "category": "external", "summary": "RHBZ#1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "bash: specially-crafted environment variables can be used to inject shell commands" }, { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1311
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1311", "url": "https://access.redhat.com/errata/RHSA-2014:1311" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1311.json" } ], "title": "Red Hat Security Advisory: bash security update", "tracking": { "current_release_date": "2024-11-14T16:26:16+00:00", "generator": { "date": "2024-11-14T16:26:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1311", "initial_release_date": "2014-09-26T17:58:08+00:00", "revision_history": [ { "date": "2014-09-26T17:58:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T15:08:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:5.6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.9" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.src", "product": { "name": "bash-0:4.1.2-15.el6_4.2.src", "product_id": "bash-0:4.1.2-15.el6_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:4.1.2-9.el6_2.2.src", "product": { "name": "bash-0:4.1.2-9.el6_2.2.src", "product_id": "bash-0:4.1.2-9.el6_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.src", "product": { "name": "bash-0:3.2-24.el5_6.2.src", "product_id": "bash-0:3.2-24.el5_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.src", "product": { "name": "bash-0:3.2-32.el5_9.3.src", "product_id": "bash-0:3.2-32.el5_9.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.src", "product": { "name": "bash-0:3.0-27.el4.4.src", "product_id": "bash-0:3.0-27.el4.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.s390x", "product": { "name": "bash-0:3.2-32.el5_9.3.s390x", "product_id": "bash-0:3.2-32.el5_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=i686" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.x86_64", "product": { "name": "bash-0:3.2-24.el5_6.2.x86_64", "product_id": "bash-0:3.2-24.el5_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.x86_64", "product": { "name": "bash-0:3.2-32.el5_9.3.x86_64", "product_id": "bash-0:3.2-32.el5_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product_id": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.x86_64", "product": { "name": "bash-0:3.0-27.el4.4.x86_64", "product_id": "bash-0:3.0-27.el4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.ia64", "product": { "name": "bash-0:3.2-24.el5_6.2.ia64", "product_id": "bash-0:3.2-24.el5_6.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.ia64", "product": { "name": "bash-0:3.2-32.el5_9.3.ia64", "product_id": "bash-0:3.2-32.el5_9.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product_id": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.ia64", "product": { "name": "bash-0:3.0-27.el4.4.ia64", "product_id": "bash-0:3.0-27.el4.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.i386", "product": { "name": "bash-0:3.2-24.el5_6.2.i386", "product_id": "bash-0:3.2-24.el5_6.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.i386", "product": { "name": "bash-0:3.2-32.el5_9.3.i386", "product_id": "bash-0:3.2-32.el5_9.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.i386", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386", "product_id": "bash-debuginfo-0:3.0-27.el4.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.i386", "product": { "name": "bash-0:3.0-27.el4.4.i386", "product_id": "bash-0:3.0-27.el4.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ppc" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.ppc", "product": { "name": "bash-0:3.2-32.el5_9.3.ppc", "product_id": "bash-0:3.2-32.el5_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.i386" }, "product_reference": "bash-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.src" }, "product_reference": "bash-0:3.0-27.el4.4.src", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.i386" }, "product_reference": "bash-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.src" }, "product_reference": "bash-0:3.0-27.el4.4.src", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386" }, "product_reference": "bash-0:3.2-24.el5_6.2.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64" }, "product_reference": "bash-0:3.2-24.el5_6.2.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src" }, "product_reference": "bash-0:3.2-24.el5_6.2.src", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64" }, "product_reference": "bash-0:3.2-24.el5_6.2.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386" }, "product_reference": "bash-0:3.2-32.el5_9.3.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64" }, "product_reference": "bash-0:3.2-32.el5_9.3.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc" }, "product_reference": "bash-0:3.2-32.el5_9.3.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x" }, "product_reference": "bash-0:3.2-32.el5_9.3.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src" }, "product_reference": "bash-0:3.2-32.el5_9.3.src", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64" }, "product_reference": "bash-0:3.2-32.el5_9.3.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.src", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.src", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
ghsa-w7vx-gpvr-f5cg
Vulnerability from github
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
{ "affected": [], "aliases": [ "CVE-2014-7186" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-09-28T19:55:00Z", "severity": "HIGH" }, "details": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", "id": "GHSA-w7vx-gpvr-f5cg", "modified": "2022-05-14T02:51:13Z", "published": "2022-05-14T02:51:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" }, { "type": "WEB", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "type": "WEB", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "type": "WEB", "url": "https://support.apple.com/HT205267" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX200217" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX200223" }, { "type": "WEB", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "type": "WEB", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "type": "WEB", "url": "https://www.suse.com/support/shellshock" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "type": "WEB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "type": "WEB", "url": "http://secunia.com/advisories/58200" }, { "type": "WEB", "url": "http://secunia.com/advisories/59907" }, { "type": "WEB", "url": "http://secunia.com/advisories/60024" }, { "type": "WEB", "url": "http://secunia.com/advisories/60034" }, { "type": "WEB", "url": "http://secunia.com/advisories/60044" }, { "type": "WEB", "url": "http://secunia.com/advisories/60055" }, { "type": "WEB", "url": "http://secunia.com/advisories/60063" }, { "type": "WEB", "url": "http://secunia.com/advisories/60193" }, { "type": "WEB", "url": "http://secunia.com/advisories/60433" }, { "type": "WEB", "url": "http://secunia.com/advisories/61065" }, { "type": "WEB", "url": "http://secunia.com/advisories/61128" }, { "type": "WEB", "url": "http://secunia.com/advisories/61129" }, { "type": "WEB", "url": "http://secunia.com/advisories/61188" }, { "type": "WEB", "url": "http://secunia.com/advisories/61283" }, { "type": "WEB", "url": "http://secunia.com/advisories/61287" }, { "type": "WEB", "url": "http://secunia.com/advisories/61291" }, { "type": "WEB", "url": "http://secunia.com/advisories/61312" }, { "type": "WEB", "url": "http://secunia.com/advisories/61313" }, { "type": "WEB", "url": "http://secunia.com/advisories/61328" }, { "type": "WEB", "url": "http://secunia.com/advisories/61442" }, { "type": "WEB", "url": "http://secunia.com/advisories/61471" }, { "type": "WEB", "url": "http://secunia.com/advisories/61479" }, { "type": "WEB", "url": "http://secunia.com/advisories/61485" }, { "type": "WEB", "url": "http://secunia.com/advisories/61503" }, { "type": "WEB", "url": "http://secunia.com/advisories/61550" }, { "type": "WEB", "url": "http://secunia.com/advisories/61552" }, { "type": "WEB", "url": "http://secunia.com/advisories/61565" }, { "type": "WEB", "url": "http://secunia.com/advisories/61603" }, { "type": "WEB", "url": "http://secunia.com/advisories/61618" }, { "type": "WEB", "url": "http://secunia.com/advisories/61622" }, { "type": "WEB", "url": "http://secunia.com/advisories/61633" }, { "type": "WEB", "url": "http://secunia.com/advisories/61636" }, { "type": "WEB", "url": "http://secunia.com/advisories/61641" }, { "type": "WEB", "url": "http://secunia.com/advisories/61643" }, { "type": "WEB", "url": "http://secunia.com/advisories/61654" }, { "type": "WEB", "url": "http://secunia.com/advisories/61703" }, { "type": "WEB", "url": "http://secunia.com/advisories/61711" }, { "type": "WEB", "url": "http://secunia.com/advisories/61780" }, { "type": "WEB", "url": "http://secunia.com/advisories/61816" }, { "type": "WEB", "url": "http://secunia.com/advisories/61873" }, { "type": "WEB", "url": "http://secunia.com/advisories/62228" }, { "type": "WEB", "url": "http://secunia.com/advisories/62312" }, { "type": "WEB", "url": "http://secunia.com/advisories/62343" }, { "type": "WEB", "url": "http://support.apple.com/HT204244" }, { "type": "WEB", "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "type": "WEB", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" } ], "schema_version": "1.4.0", "severity": [] }
CVE-2014-7186
Vulnerability from jvndb
▼ | Vendor | Product |
---|---|---|
QNAP Systems | QNAP QTS |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "dc:date": "2015-12-25T13:47+09:00", "dcterms:issued": "2014-10-28T14:39+09:00", "dcterms:modified": "2015-12-25T13:47+09:00", "description": "QNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability (CWE-78).\r\n\r\nYuuki Wakisaka of University of Electro-Communications reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "sec:cpe": { "#text": "cpe:/o:qnap:qts", "@product": "QNAP QTS", "@vendor": "QNAP Systems", "@version": "2.2" }, "sec:cvss": { "@score": "10.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000126", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN55667175/index.html", "@id": "JVN#55667175", "@source": "JVN" }, { "#text": "https://jvn.jp/vu/JVNVU97219505/index.html", "@id": "JVNVU#97219505", "@source": "JVN" }, { "#text": "http://jvn.jp/vu/JVNVU97220341/index.html", "@id": "JVNVU#97220341", "@source": "JVN" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004399.html", "@id": "JVNDB-2014-004399", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004410.html", "@id": "JVNDB-2014-004410", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004431.html", "@id": "JVNDB-2014-004431", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004476.html", "@id": "JVNDB-2014-004476", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004432.html", "@id": "JVNDB-2014-004432", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004433.html", "@id": "JVNDB-2014-004433", "@source": "JVN iPedia" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "NVD" }, { "#text": "http://www.kb.cert.org/vuls/id/252743", "@id": "VU#252743", "@source": "CERT-VN" }, { "#text": "https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01", "@id": "ICSA-15-344-01", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a", "@id": "ICSA-14-269-01A", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "QNAP QTS vulnerable to OS command injection" }
gsd-2014-7186
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-7186", "description": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", "id": "GSD-2014-7186", "references": [ "https://www.suse.com/security/cve/CVE-2014-7186.html", "https://access.redhat.com/errata/RHSA-2014:1865", "https://access.redhat.com/errata/RHSA-2014:1354", "https://access.redhat.com/errata/RHSA-2014:1312", "https://access.redhat.com/errata/RHSA-2014:1311", "https://access.redhat.com/errata/RHSA-2014:1306", "https://ubuntu.com/security/CVE-2014-7186", "https://advisories.mageia.org/CVE-2014-7186.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-7186.html", "https://linux.oracle.com/cve/CVE-2014-7186.html", "https://packetstormsecurity.com/files/cve/CVE-2014-7186" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-7186" ], "details": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", "id": "GSD-2014-7186", "modified": "2023-12-13T01:22:47.464505Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7186.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7186" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "tags": [], "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7186.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "61479", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61479" }, { "name": "61641", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61641" }, { "name": "61618", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61618" }, { "name": "61622", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61622" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "tags": [], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "61636", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61636" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "61485", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61485" }, { "name": "59907", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59907" }, { "name": "61654", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "tags": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "61565", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61565" }, { "name": "61643", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61643" }, { "name": "61503", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61503" }, { "name": "61711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61711" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "tags": [], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "61633", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61633" }, { "name": "61552", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61552" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "61703", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61703" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "61283", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61283" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "61603", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61603" }, { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "HPSBGN03138", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61188", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61188" }, { "name": "HPSBHF03125", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "name": "60034", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60034" }, { "name": "61816", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61816" }, { "name": "61128", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61128" }, { "name": "61313", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61313" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "61442", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61442" }, { "name": "61287", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61287" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "60055", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60055" }, { "name": "61129", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61129" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "61780", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "tags": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "61471", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61471" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "58200", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58200" }, { "name": "61328", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61328" }, { "name": "60193", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60193" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "61065", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61065" }, { "name": "61550", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61550" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "61312", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61312" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "60063", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60063" }, { "name": "61291", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61291" }, { "name": "60044", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60044" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "tags": [], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "60433", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60433" }, { "name": "60024", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60024" }, { "name": "HPSBGN03141", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "HPSBGN03142", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "HPSBST03157", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "JVN#55667175", "refsource": "JVN", "tags": [], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "HPSBMU03144", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "HPSBST03131", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "tags": [], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBMU03143", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "tags": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "HPSBST03129", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "61873", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61873" }, { "name": "HPSBST03181", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "HPSBST03154", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "HPSBMU03165", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03148", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "62343", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62343" }, { "name": "62312", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62312" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBMU03245", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "HPSBMU03246", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "SSRT101711", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "SSRT101830", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "HPSBMU03217", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205267" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "62228", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62228" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-09T19:52Z", "publishedDate": "2014-09-28T19:55Z" } } }
var-201409-1147
Vulnerability from variot
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. GNU Bash is prone to a local memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. GNU Bash 3.2 and later are vulnerable; prior versions may also be affected.
NOTE: This vulnerability can only be exploited if the attacker already has valid administrative login credentials. -----BEGIN PGP SIGNED MESSAGE-----
CA20141001-01: Security Notice for Bash Shellshock Vulnerability
Issued: October 01, 2014 Updated: October 03, 2014
CA Technologies is investigating multiple GNU Bash vulnerabilities, referred to as the "Shellshock" vulnerabilities, which were publicly disclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE-2014-6278 have been assigned to these vulnerabilities.
The CA Technologies Enterprise Information Security team has led a global effort to identify and remediate systems and products discovered with these vulnerabilities. We continue to patch our systems as fixes become available, and we are providing fixes for affected CA Technologies products.
CA Technologies continues to aggressively scan our environments (including servers, networks, external facing applications, and SaaS environments) to proactively monitor, identify, and remediate any vulnerability when necessary.
Risk Rating
High
Platform
AIX Android (not vulnerable, unless rooted) Apple iOS (not vulnerable unless jailbroken) Linux Mac OS X Solaris Windows (not vulnerable unless Cygwin or similar ported Linux tools with Bash shell are installed) Other UNIX/BSD based systems if Bash is installed Any other OS or JeOS that utilizes Bash
Affected Products
The following products have been identified as potentially vulnerable, and we have made fixes available for all of these products.
CA API Management (Linux appliance only)
CA Application Performance Management (TIM is the only affected APM component)
CA Application Performance Management Cloud Monitor
CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM)
CA Layer 7 products (API Gateway, Mobile Access Gateway, API Management Portal)
CA User Activity Reporting Module (Enterprise Log Manager)
Note: This security notice will be updated if other CA Technologies products are determined to be vulnerable.
In most cases, the Bash vulnerabilities will need to be patched by OS vendors. Exceptions may include CA Technologies appliances, and software products that include Linux, UNIX or Mac OS X based operating systems (that include Bash).
Affected Components
CentOS Cygwin GNU Bash Red Hat Enterprise Linux SUSE Linux
Non-Affected Products
IMPORTANT NOTE: This listing includes only a small subset of the unaffected CA Technologies products. We're including unaffected products that customers have already inquired about. While the following CA Technologies products are not directly affected by the Bash vulnerabilities, the underlying operating systems that CA Technologies software is installed on may be vulnerable. We strongly encourage our customers to follow the recommendations provided by their vendors for all operating systems they utilize.
All CA SaaS / On Demand products were either not vulnerable or have already been patched.
CA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does not execute CGI scripts, or spawn or execute shell commands from within the app. AHS infrastructure already patched.
CA Asset Portfolio Management
CA AuthMinder (Arcot WebFort)
CA AuthMinder for Business Users
CA AuthMinder for Consumers
CA AutoSys products - We use the bash shell that comes with the operating system and the customer is responsible for patching their OS. Additionally, the agents themselves do not distribute any scripts that use bash.
CA Clarity On Demand
CA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or use it, but because we are deployed on RHEL, customers may be indirectly affected. Customers using RHEL should apply patches provided by Red Hat.
CA Console Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.
CA ControlMinder
CA DataMinder (formerly DLP) products – Software and appliance confirmed not vulnerable. Note: Linux Agents shipped, but no public SSH or Web apps are used in these agents. Customers should patch bash shell on any Linux server with DataMinder agents. DataMinder agents should continue to function normally.
CA Digital Payments SaaS (previously patched)
CA Directory
CA eCommerce SaaS / On Demand (previously patched)
CA Endevor Software Change Manager
CA Federation (formerly SiteMinder Federation)
CA GovernanceMinder
CA IdentityMinder
CA Infrastructure Management
CA JCLCheck
CA Job Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.
CA NetQoS GigaStor Observer Expert
CA Network Flow Analysis
CA Performance Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.
CA RiskMinder
CA Service Desk Manager
CA Service Operations Insight (SOI)
CA SiteMinder
CA SOLVE:Access
CA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes from your underlying operating system vendor.
CA Strong Authentication
CA System Watchdog for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.
CA Top Secret
CA Universal Job Management Agent for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.
CA Virtual Assurance for Infrastructure Managers (VAIM)
Solution
CA Technologies has issued the following fixes to address the vulnerabilities.
CA API Management: Patches for Linux appliance are available through CA Support to customers of Gateway (applicable for all versions – 6.1.5, 6.2, 7.0, 7.1, 8.0, 8.1, 8.1.1, 8.1.02).
CA Application Performance Management: KB article for APM TIM has been published. APM TIM is the only part of APM that was affected. Refer to TEC618037.
CA Application Performance Management Cloud Monitor: New images are available for subscribers. Download the latest OPMS version 8.2.1.5. For assistance, contact CA Support.
CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM): Very low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do not use Bash at all for the CEM operating system that we have shipped in the past. This means that customers who patch the OS will not impact the ability of the CEM TIMsoft from operating. However prior to version 9.6, the TIM installation script does use the bash shell. See new KB article TEC618037 for additional information.
CA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal): Fixes for all Bash vulnerabilities and a security bulletin are available on the Layer 7 Support website.
CA User Activity Reporting Module (Enterprise Log Manager): All 12.5 and 12.6 GA versions are potentially affected. Patches provided on 2014-09-30. To get the patch, use the OS update functionality to get the latest R12.6 SP1 subscription update. Note that you can update R12.5 SPx with the R12.6 SP1 OS update. For assistance, contact CA Support.
Workaround
None
To help mitigate the risk, we do strongly encourage all customers to follow patch management best practices, and in particular for operating systems affected by the Bash Shellshock vulnerabilities.
References
CVE-2014-6271 - Bash environment variable command injection CVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271 CVE-2014-7186 - Bash parser redir_stack memory corruption CVE-2014-7187 - Bash nested flow control constructs off-by-one CVE-2014-6277 - Bash untrusted pointer use uninitialized memory CVE-2014-6278 - Bash environment variable command injection
CA20141001-01: Security Notice for Bash Shellshock Vulnerability https://support.ca.com/irj/portal/anonymous/phpsbpldgpg
Change History
v1.0: 2014-10-01, Initial Release v1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, Clarity OD, All SaaS/OD products to list of Non-Affected Products. v1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated UARM solution info.
If additional information is required, please contact CA Technologies Support at https://support.ca.com.
If you discover a vulnerability in CA Technologies products, please report your findings to the CA Technologies Product Vulnerability Response Team at vuln@ca.com. PGP key: support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782
Security Notices https://support.ca.com/irj/portal/anonymous/phpsbpldgpg
Regards, Ken Williams Director, Product Vulnerability Response Team CA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com Ken.Williams@ca.com | vuln@ca.com
Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
-----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15238) Charset: utf-8
wsBVAwUBVDK+PZI1FvIeMomJAQFl/Af/TqrSE/h4r3gs9PwrWKdt21PCRI3za9Lx M5ZyTdVDIQ9ybgPkLqsovNRPgVqd7zwDHsx0rzvF5Y82uO+vQ63BuEV2GnczAax/ EiAW4WVxUgWG+lAowGV55Of8ruv/gOiAWTjFhkqpsyVg96ZMw2HLG62IwZL1j0qa oLCu0y3VrGvqH0g2hi75QwHAjNCdlEsD4onUqTCc9cRTdLwFCZrUQ8KTrqIL7LK5 Uo5T9C1UeAyNTo3KiJ/zw3BCOTkpl99dmg3NW0onU/1r1CXdlyS7opLB+GJ+xGwP xRQdUsOIhzfRzx7bsao2D43IhDnzJBBFJHdeMPo18WBTfJ7aUgBwGQ== =B62b -----END PGP SIGNATURE----- . Note: All versions of HP Thin Pro and HP Smart Zero Core operating systems prior to version 5.1.0 are affected by these vulnerabilities. Following is a complete list of affected operating systems and Hardware Platforms Affected.
Note: If you participated in the ThinPro 5.1.0 beta program then upgrade to the release version as soon as it becomes available.
HP ThinPro and HP Smart Zero Core (x86) v5.0.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-5.0-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (x86) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (ARM) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-arm.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (X86) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (ARM) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-arm.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (X86) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_i386.deb .
HP ThinPro and HP Smart Zero Core (ARM) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_armel.deb .
HP ThinPro and HP Smart Zero Core v2.x and earlier An update will be made available for customers upon request
HISTORY Version:1 (rev.1) - 03 October 2014 Initial release Version:2 (rev.2) - 06 November 2014 Updated List of CVEs, Updated impacted products, Updated resolution table
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Summary:
An updated rhev-hypervisor6 package that fixes several security issues is now available. Relevant releases/architectures:
RHEV-M 3.4 - noarch
- The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. (CVE-2014-7169)
A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. (CVE-2014-1568)
It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code. (CVE-2014-7186)
An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. (CVE-2014-7187)
Red Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271, and the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges Antoine Delignat-Lavaud and Intel Product Security Incident Response Team as the original reporters of CVE-2014-1568.
HP StoreEver ESL E-series Tape Library
- Disable DHCP and only use static IP addressing.
HP Virtual Library System (VLS)
- Disable DHCP and only use static IP addressing.
Please refer to the RESOLUTION section below for a list of impacted products.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: bash security update Advisory ID: RHSA-2014:1311-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html Issue date: 2014-09-26 CVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 =====================================================================
- Summary:
Updated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat Enterprise Linux 6.4 Extended Update Support.
Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 4 ELS) - i386, ia64, x86_64 Red Hat Enterprise Linux AUS (v. 6.2 server) - x86_64 Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64 Red Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64
- Description:
The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh).
It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169)
Applications which directly create Bash functions as environment variables need to be made aware of the changes to the way names are handled by this update. For more information see the Knowledgebase article at https://access.redhat.com/articles/1200223
Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes.
All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)
- Package List:
Red Hat Enterprise Linux AS (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
ia64: bash-3.0-27.el4.4.i386.rpm bash-3.0-27.el4.4.ia64.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.ia64.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux ES (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux LL (v. 5.6 server):
Source: bash-3.2-24.el5_6.2.src.rpm
i386: bash-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm
ia64: bash-3.2-24.el5_6.2.i386.rpm bash-3.2-24.el5_6.2.ia64.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.ia64.rpm
x86_64: bash-3.2-24.el5_6.2.x86_64.rpm bash-debuginfo-3.2-24.el5_6.2.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.9 server):
Source: bash-3.2-32.el5_9.3.src.rpm
i386: bash-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm
ia64: bash-3.2-32.el5_9.3.i386.rpm bash-3.2-32.el5_9.3.ia64.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.ia64.rpm
ppc: bash-3.2-32.el5_9.3.ppc.rpm bash-debuginfo-3.2-32.el5_9.3.ppc.rpm
s390x: bash-3.2-32.el5_9.3.s390x.rpm bash-debuginfo-3.2-32.el5_9.3.s390x.rpm
x86_64: bash-3.2-32.el5_9.3.x86_64.rpm bash-debuginfo-3.2-32.el5_9.3.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux AUS (v. 6.2 server):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-4.1.2-9.el6_2.2.x86_64.rpm bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-4.1.2-15.el6_4.2.i686.rpm bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-4.1.2-15.el6_4.2.ppc64.rpm bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-4.1.2-15.el6_4.2.s390x.rpm bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.2):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm bash-doc-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm bash-doc-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm bash-doc-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm bash-doc-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-7169.html https://www.redhat.com/security/data/cve/CVE-2014-7186.html https://www.redhat.com/security/data/cve/CVE-2014-7187.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1200223
Release Date: 2014-12-16 Last Updated: 2014-12-16
Potential Security Impact: Remote code execution
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP Vertica.
References:
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 SSRT101827
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Vertica AMI's and Virtual Machines prior to v7.1.1-0.
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2104-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2104-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
We recommend installing Vertica v7.1.1-0 or subsequent, or manually installing a new version of Bash, such as Bash43-027.
HP has released the following updates to resolve this vulnerability for HP Vertica products.
Update to the latest VM image available at: https://my.vertica.com
For customers using the AMI version HP Vertica Analytics platform, please install the latest image available at Amazon.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG &jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW
MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS
PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux
TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Relevant Releases (Affected products for which remediation is present)
vCenter Log Insight 2.0
- Problem Description
a. Bash update for multiple products.
Bash libraries have been updated in multiple products to resolve
multiple critical security issues, also referred to as Shellshock.
VMware products have been grouped into the following four
product categories:
I) ESXi and ESX Hypervisor
ESXi is not affected because ESXi uses the Ash shell (through
busybox), which is not affected by the vulnerability reported
for the Bash shell. See table 1 for
remediation for ESX.
II) Windows-based products
Windows-based products, including all versions of vCenter Server
running on Windows, are not affected.
III) VMware (virtual) appliances
VMware (virtual) appliances ship with an affected version of Bash.
See table 2 for remediation for appliances.
IV) Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances)
Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances) might use the Bash shell that is part of the
operating system.
MITIGATIONS
VMware encourages restricting access to appliances through
firewall rules and other network layer controls to only trusted IP
addresses. This measure will greatly reduce any risk to these
appliances.
RECOMMENDATIONS
VMware recommends customers evaluate and deploy patches for
affected products in Table 1 and 2 below as these
patches become available.
Column 4 of the following tables lists the action required to
remediate the vulnerability in each release, if a solution is
available.
Table 1 - ESXi and ESX Hypervisor
=================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
ESXi any ESXi Not affected
ESX 4.1 ESX Patch pending *
ESX 4.0 ESX Patch pending *
* VMware will make VMware ESX 4.0 and 4.1 security patches available
for the Bash shell vulnerability. This security patch release is an
exception to the existing VMware lifecycle policy.
Table 2 - Products that are shipped as a (virtual) appliance.
=============================================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
vCenter Server Appliance 5.x Linux Patch Pending
Horizon DaaS Platform 6.x Linux Patch Pending
Horizon Workspace 1.x, 2.x Linux Patch Pending
IT Business Management Suite 1.x Linux Patch Pending
NSX for Multi-Hypervisor 4.x Linux Patch Pending
NSX for vSphere 6.x Linux Patch Pending
NVP 3.x Linux Patch Pending
vCenter Converter Standalone 5.x Linux Patch Pending
vCenter Hyperic Server 5.x Linux Patch Pending
vCenter Infrastructure Navigator 5.x Linux Patch Pending
vCenter Log Insight 1.x, 2.x Linux 2.0 U1
vCenter Operations Manager 5.x Linux Patch Pending
vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending
vCenter Site Recovery Manager 5.x Linux Patch Pending
** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux Patch Pending vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux Patch Pending VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux Patch Pending VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux Patch Pending
** This product includes Virtual Appliances that will be updated, the
product itself is not a Virtual Appliance. Solution
vCenter Log Insight
Downloads: https://www.vmware.com/go/download-vcenter-log-insight (click Go to Downloads) Documentation: http://kb.vmware.com/kb/2091065
- References
VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
- Change Log
2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2014 VMware Inc.
Note: HP and the switch vendor recommend running an active version of Fabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge (SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around information provided in the MITIGATION INFORMATION section below to protect HP StoreFabric B-series switches from this vulnerability.
Fabric OS (FOS) v7.3.0b (This version will be available soon and this bulletin will revised at that time)
The following focused fix FOS versions are available for the previously released versions and have been renamed to include an additional hexadecimal character appended to the FOS version on which it is based:
FOS v7.2.1c1
FOS v7.2.0d6
FOS v7.1.2b1
FOS v7.1.1c1
FOS v7.1.0cb
FOS v7.0.2e1
FOS v7.0.0d1
FOS v6.4.3f3
FOS v6.4.2a3
FOS v6.2.2f9
MITIGATION INFORMATION
HP recommends the following steps to reduce the risk of this vulnerability:
- Place the HP StoreFabric SAN switch and other data center critical
infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric FOS switches. Delete guest accounts and temporary accounts created for one-time usage needs. - Utilize FOS password policy management to strengthen the complexity, age, and history requirements of switch account passwords.
Shift_JIS, also known as "SJIS", is a character encoding for the Japanese language. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may need to be restarted, and affected interactive users may need to re-login. Installing these updated packages without restarting services will address the vulnerability, but functionality may be impacted until affected services are restarted
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-1147", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.7" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.01" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.4" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.1" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.6" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.2" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.3" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.5" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2.48" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.0" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.1" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.3" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.0" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.03" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.0.16" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.01.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.04" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.05" }, { "model": "manageone v100r002c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "barracuda", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "centos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cygwin", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "extreme", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fireeye", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnu bash", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mageia", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mcafee", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "monroe", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "niksun", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "palo alto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qnap security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sophos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "xirrus", "version": null }, { "model": "bash", "scope": "lte", "trust": 0.8, "vendor": "gnu", "version": "4.3 bash43-026" }, { "model": "manageone v100r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "unified contact center express", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "manageone v100r002c20", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "unity connection", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "paging server", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1689.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.924.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.1" }, { "model": "oceanstor s5300 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.31" }, { "model": "ucs invicta appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secureplatform r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.51" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.166" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.891.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.15" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1012" }, { "model": "manageone v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "e9000 blade server ch220 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1005.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.42" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1039" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "gaia embedded r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura communication manager sp5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.434.0" }, { "model": "telepresence manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1311.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.687.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.365.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.879.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.74" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.92" }, { "model": "protectier appliance edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.926.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.47255" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.39" }, { "model": "oceanstor s5500t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.530.0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2053-4240" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.58" }, { "model": "ip interoperability and collaboration system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asr series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.122" }, { "model": "key vault", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.59" }, { "model": "database appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.57" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "cloudsystem enterprise software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "junos space ja1500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.2" }, { "model": "oceanstor dorado g2 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "2100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.633.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.0" }, { "model": "download server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.769.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "gaia embedded r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.785.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.225" }, { "model": "secureplatform r77.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.385.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.319.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.908.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.62" }, { "model": "oceanstor s5600 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "unified intelligence center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.374.0" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.52" }, { "model": "secureplatform r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.86" }, { "model": "secureplatform r75.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.40" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1043" }, { "model": "rack server rh2288 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.8" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.604.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.44" }, { "model": "secureplatform r70", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.35" }, { "model": "gaia embedded r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.150" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.0" }, { "model": "vcenter orchestrator appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.756.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.34" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.886.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.123" }, { "model": "ipso r75.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "worklight quality assurance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2" }, { "model": "oceanstor s2200t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.51" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "gaia embedded r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.233" }, { "model": "nvp", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.88" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "oceanstor s6800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.955.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1082.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.760.0" }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.110" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.12" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1658.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.368.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.23" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.594.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.118" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "gaia embedded r75.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.743.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.8" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.2" }, { "model": "finesse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96365" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.83" }, { "model": "2054-e01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.816.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.88" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.13" }, { "model": "telepresence tx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.393.0" }, { "model": "e9000 blade server ch140 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.362.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.618.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.628.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.56" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.815.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.423.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.8" }, { "model": "system storage san80b-4 2498-b80", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.802.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.12" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.46" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "oceanstor s5500t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.323.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.804.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.77" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.370.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.95" }, { "model": "espace uc v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.805.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.789.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.315" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.512.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.901.0" }, { "model": "t520 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "gaia r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura application server sip core pb23", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.0" }, { "model": "associates api management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.729.0" }, { "model": "secureplatform r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.102" }, { "model": "isoc v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.15" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "8700" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.483.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.467.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.10" }, { "model": "secureplatform r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.25" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.0" }, { "model": "qip", "scope": "eq", "trust": 0.3, "vendor": "alcatel lucent", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.1" }, { "model": "ssl vpn", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.5" }, { "model": "e9000 blade server ch242 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1017" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.727.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.748.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.7" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.89" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.379.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.654.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.72" }, { "model": "oceanstor s5500t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4" }, { "model": "rack server rh2285h v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.8" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.73" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.334.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.862.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.37" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.303" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.721.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.0" }, { "model": "system storage san384b-2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-416" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1030" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.132" }, { "model": "uma-db v100r001c00spc302", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.336" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.32" }, { "model": "proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.211" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.602.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.2" }, { "model": "2054-e04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "virtualization provisioning service", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "espace usm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1058.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.931.0" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.722.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.520.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1022" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.651.0" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "oceanstor s6800t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.109" }, { "model": "aura communication manager utility services sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.16.1.0.9.8" }, { "model": "secure access link gas", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.476.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.61" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.1" }, { "model": "oceanstor s5600t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.690.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.570.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.347.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.13" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.412.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.27" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "vcloud connector", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.634.1" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "secureplatform r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vsphere management assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.329.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.1" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1085.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.664.1" }, { "model": "gaia r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.26" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.596.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.103" }, { "model": "espace cc v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.113" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.69" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.730.0" }, { "model": "oceanstor s5500t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1060.0" }, { "model": "oceanstor s6800t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.40" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.610.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.422.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.48" }, { "model": "oceanstor cse v100r002c00lhwy01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.24" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "aura application server sip core pb28", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.116" }, { "model": "cloud single sign on", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.299.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.31" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.19" }, { "model": "secureplatform r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.371.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.107" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.1.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.615.0" }, { "model": "telepresence system series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.599.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.51" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.102" }, { "model": "ios-xe for catalyst 4k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.12" }, { "model": "oceanstor hvs85t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.92" }, { "model": "system networking san24b-5 2498-f24", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75250" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1675.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.50" }, { "model": "associates layer mobile access gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "telepresence ip gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.28" }, { "model": "oceanstor s5600t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.873.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.301.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.794.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.40" }, { "model": "oceanstor s5600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.781.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1298.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.18" }, { "model": "secureplatform r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.72" }, { "model": "oceanstor v100r001c10", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "secureplatform r71.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "power hmc r7.9.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.554.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.13" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.08.0.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.631.0" }, { "model": "ios-xe for asr903", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.125" }, { "model": "move scheduler", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.54" }, { "model": "ediscovery identification and collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.477.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.941.0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.4" }, { "model": "secureplatform r75", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.516.0" }, { "model": "qradar security information and event manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.430.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1684.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.457.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1008.0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.943.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.21" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.609.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364160" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.211.0" }, { "model": "ios-xe for isr4400", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.42" }, { "model": "t5565 thin client hp t5565z smart client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "nvp", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.582.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.589.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.575.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1663.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.26" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "media experience engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "message networking sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1280.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.122" }, { "model": "3722-s52", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.39" }, { "model": "vcenter orchestrator appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.726.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1034.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.36" }, { "model": "algo risk service on cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "oceanstor s5800t v200r002c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "gaia embedded r71.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.32" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.716.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.480.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.700.0" }, { "model": "associates application performance management cloud monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "oceanstor s5600t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh310 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.28" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1684.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.5" }, { "model": "oceanstor s6800t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh628 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.21" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.7" }, { "model": "oceanstor s5800t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1652.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.6" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.627.0" }, { "model": "network convergence system series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.4" }, { "model": "gaia r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.28" }, { "model": "firewall enterprise control center", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.19" }, { "model": "e9000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.826.0" }, { "model": "oceanstor hdp3500e v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.581.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.1" }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.544.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.130" }, { "model": "ipso r77", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1041" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.42" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.336.0" }, { "model": "storeever esl g3 tape library 665h gs12501", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "associates layer api gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.124" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1295.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.922.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.113" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.638.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.21" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.910.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.149" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1686.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.90" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.6" }, { "model": "firewall enterprise control center", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.671.0" }, { "model": "bsc6000 v900r008c15", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.66" }, { "model": "oceanstor s2600 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.68" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.424.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.39" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.898.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.478.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.540.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.57" }, { "model": "system storage san384b", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-192" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "67000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.46" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1004.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.136" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.935.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.821.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.1" }, { "model": "studio", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.492.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.33" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57550" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.923.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.948.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.114" }, { "model": "rack server rh2288h v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1024.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.784.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.48" }, { "model": "oceanstor css v100r001c03", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.30" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.44" }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.80" }, { "model": "system storage san06b-r 2498-r06", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "business service automation essentials", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.16" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.16" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.90" }, { "model": "fusionmanager v100r003c10cp6001", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.2" }, { "model": "secureplatform r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia embedded r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.92" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.683.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.425.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.486.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.747.0" }, { "model": "oceanstor vis6600t v200r003c10spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.333" }, { "model": "websphere process server hypervisor edition for novell suse", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.9" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.2" }, { "model": "studio beta", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "qradar risk manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "storefabric b-series switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1300.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.17" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.42" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mxe series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1028" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.33" }, { "model": "vcloud automation center", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.773.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.26" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "oceanstor s5800t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.10" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.157" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.739.0" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.19" }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.27" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491059" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.2" }, { "model": "ios-xe for csr1000v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.159.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18" }, { "model": "oceanstor sns5120 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1028.0" }, { "model": "aura application server sip core pb5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1013" }, { "model": "espace vcn3000 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.658.0" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9.1" }, { "model": "e9000 chassis v100r001c00spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vcenter server appliance update b", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1023" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.761.0" }, { "model": "cloud services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.690.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.16" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.660.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1676.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.41" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.137" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1669.1" }, { "model": "secure access remote access concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.587.0" }, { "model": "usc invicta series autosupport portal", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.16" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.321.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.14" }, { "model": "secureplatform r71.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.48" }, { "model": "nexus switch for nexus series 5.0 u1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v3000" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.62" }, { "model": "fusionaccess v100r005c10spc203", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.861.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.524.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.717.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.11" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.880.0" }, { "model": "oceanstor s2600t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.607.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.471.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.61" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.59" }, { "model": "gaia embedded r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.923.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.37" }, { "model": "oceanstor cse v100r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.232" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.58" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.778.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.74" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.03" }, { "model": "protectier entry edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "horizon daas platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.655.0" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.579.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.0" }, { "model": "oceanstor s5600t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1008" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.694.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.669.0" }, { "model": "ds8000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.97" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3" }, { "model": "gaia embedded r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "visualization fault and performance manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "gtsoftx3000 v200r001c01sph106", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.190.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.3.05.00" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.400.0" }, { "model": "vertica", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.0" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.74" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.592.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.26" }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "storeever esl e-series tape library", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vds service broker", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.902.0" }, { "model": "telepresence multipoint switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "ipso r70.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "oceanstor s3900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ipso r77.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "ip deskphones", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.39" }, { "model": "d9036 modular encoding platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1272.0" }, { "model": "fusionstorage dsware v100r003c02spc201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r75.47", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.548.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.640.0" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.2" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.23" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "qradar vulnerability manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.88" }, { "model": "oceanstor v100r001c02", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v1800" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.18" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.110" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.514" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.759.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.587.1" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.59" }, { "model": "oceanstor s5800t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "n series oncommand 6.1r1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.42" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "esight network v200r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77000" }, { "model": "e6000 blade server bh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.56" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.69" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.13" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.3" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1661.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.30" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.662.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.149" }, { "model": "gaia r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "flashsystem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v8400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.833.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.47" }, { "model": "gaia r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.119" }, { "model": "vcenter hyperic server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "privileged identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.2" }, { "model": "vcenter operations manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.810.0" }, { "model": "ipso r75.40vs", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "gaia ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.23" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.871.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.41" }, { "model": "system storage san40b-4 2498-b40", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "e6000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1681.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.649.0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.78" }, { "model": "oceanstor s5600t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.1" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.316.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.9" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.90" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75350" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.692.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.7" }, { "model": "universal small cell cloudbase", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11" }, { "model": "cloudsystem foundation", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.639.0" }, { "model": "wireless lan wos with aos", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "91007.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.98" }, { "model": "quantum son suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.630.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.154.0" }, { "model": "telepresence recording server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.885.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.52" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "ipso r71.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.569.0" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7755061.090.225.06200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.962.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1675.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.0" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.295.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.123" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.318.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.619.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.14" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.63" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "t620 flexible quad core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.6" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7835" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1004" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.86" }, { "model": "nsm3000", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1033" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.100" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3050" }, { "model": "secureplatform r71.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1044" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.160" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1679.0" }, { "model": "secureplatform r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia embedded r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7225" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.56" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.11.3" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.539.0" }, { "model": "e6000 blade server bh622 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.661.0" }, { "model": "insight control for linux central management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.91" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.939.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.474.0" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.893.1" }, { "model": "audit vault and database firewall", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "vertica", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1.1-0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.42" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.1" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.883.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.306" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.62" }, { "model": "galax8800 v100r003c10cp6001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.348.0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.515" }, { "model": "life cycle management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.62" }, { "model": "t410 smart zero client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.7" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.935.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.705.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1082.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.122" }, { "model": "application dependency planner", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.395.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1016.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.776.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.84" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x0" }, { "model": "system storage san768b-2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-816" }, { "model": "oceanstor s6800t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1075.0" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.33" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.172" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.20" }, { "model": "oceanstor uds v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.117" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.16" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.443.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.296.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "gaia r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "secure access core concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.34" }, { "model": "esight network v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.18" }, { "model": "videoscape distribution suite transparent caching", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.776.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96379" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.217" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.40" }, { "model": "9710-e08", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "vcenter infrastructure navigator", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1074.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.900.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.75" }, { "model": "junos space ja2500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.71" }, { "model": "enterprise linux server eus 6.5.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.611.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.407.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.892.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.29" }, { "model": "vsphere big data extensions", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.518.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.346.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1658.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.897.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.102" }, { "model": "oceanstor css v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.421.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.56" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "prime lan management solution", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.0" }, { "model": "ipso r75.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcenter log insight", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "36.0.1985.143" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1003.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.927.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.23" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "storeever esl g3 tape library 671h gs00601", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "nexus switch for nexus series 4.0 n1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v5000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.16" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1021.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.462.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.77" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.51" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.818.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.645.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.4" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.1.1539" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1065.0" }, { "model": "database appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2" }, { "model": "storeever esl g3 tape library 663h gs04601", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.674.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.39" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57350" }, { "model": "hyper-scale manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.905.0" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.4" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "gaia r71.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.84" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.34024" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1040.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.939.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "secureplatform r77", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.758.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.116" }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.184" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.154" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.419.0" }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.608.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.40" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.135" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.675.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.124" }, { "model": "high-density server dh620 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.9" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1072.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.102" }, { "model": "oceanstor s2600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.435.0" }, { "model": "oceanstor vtl6000 v100r003c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.617.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.9" }, { "model": "storeever esl g3 tape library 655h gs10201", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1019.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.64" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.685.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.312" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.30" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.699.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.961.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.202" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75300" }, { "model": "ucs b-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.341" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.57" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1058" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1662.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1669.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1054" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.506.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.16" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.168" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.35" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1286.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.703.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.668.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.744.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "configuration and orchestration manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.74" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75450" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1078.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.328.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.91" }, { "model": "sig9800 sig9800-x16 v300r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.381.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.144" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1283.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.25" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.711.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.330" }, { "model": "automation insight", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.21" }, { "model": "vcenter log insight", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "ios-xe for asr1k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.147" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.797.0" }, { "model": "secureplatform r75.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oic v100r001c00spc403", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.14443" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.521.0" }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.46" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.774.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.2" }, { "model": "business edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.803.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.623.0" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.51" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.21" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.49" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.345.0" }, { "model": "secureplatform r71.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1001.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.859.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1674.1" }, { "model": "business service automation essentials", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.930.0" }, { "model": "starter kit for cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.562.0" }, { "model": "gaia embedded r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.798.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.227" }, { "model": "oceanstor s2600t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.59" }, { "model": "dc health check", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.85" }, { "model": "enterprise linux long life 5.9.server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.111" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7855" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.647.0" }, { "model": "uma v200r001c00spc202", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.937.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.26" }, { "model": "gaia embedded r75", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor s5800t v200r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.277.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.71" }, { "model": "gss 4492r global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.30" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.136" }, { "model": "t510 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.867.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.120" }, { "model": "gaia r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.329" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.25" }, { "model": "rack server rh2285 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.746.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.70" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1287.1" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.753.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1038.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.7" }, { "model": "nvs v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.496.0" }, { "model": "manageone v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.294.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.728.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.706.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.824.0" }, { "model": "2054-e07", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.28" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.0" }, { "model": "unstructured data identification and mgmt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.35" }, { "model": "ipso r71.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.585.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.68" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "e6000 blade server bh640 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.557.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.91" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.15" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.549.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.111" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.1" }, { "model": "boot attestation service", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "vcloud director appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "global threat intelligence proxy", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.207" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.440.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.343.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1053.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.957.0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.573.0" }, { "model": "high-density server dh320 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1055" }, { "model": "espace dcm v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.806.0" }, { "model": "enterprise linux server eus 6.4.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.863.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.652.0" }, { "model": "oceanstor s2600t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.5" }, { "model": "exalytics", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.719.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.952.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "secureplatform r75.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1019" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.872.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.57" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1022.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.153" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.341.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.11" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.223" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1657.0" }, { "model": "espace ums v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1273.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1274.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1056.0" }, { "model": "oceanstor s6800e v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1303.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1015" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.714.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.8" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.13" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.6" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.150" }, { "model": "secureplatform r70.1", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.230" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.942.0" }, { "model": "gaia embedded r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.4" }, { "model": "aura application server sip core pb19", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "oceanstor s5600t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.49" }, { "model": "prime ip express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.7" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.720.0" }, { "model": "healthanalyzer", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.904.0" }, { "model": "gaia r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.212" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "oceanstor s5900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.55" }, { "model": "strm/jsa", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.22" }, { "model": "autobackup server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1659.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1052.0" }, { "model": "videoscape conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.305.0" }, { "model": "high-density server xh310 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1034" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.2.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.145" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.646.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.697.0" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.222" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.593.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.41" }, { "model": "asset manager sensor", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.7" }, { "model": "quantum virtualized packet core", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.120" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.100" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.20" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.339.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1060.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.626.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1031.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.80" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.708.0" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.559.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.625.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.64" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "e9000 blade server ch240 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "oceanstor 9000e v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1009.0" }, { "model": "oceanstor css v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.326" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1062.1" }, { "model": "hyperdp oceanstor n8500 v200r001c09", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.881.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.800.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.680.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.659.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37599" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.330.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.2" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.93" }, { "model": "power hmc r7.6.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "rack server rh1288 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1001" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.18" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11000" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.70" }, { "model": "tam data manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1056" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.33" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.768.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.871.0" }, { "model": "gaia embedded r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "9710-e01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "qradar security information and event manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.35" }, { "model": "oceanstor hvs85t v100r001c99", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1304.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.61" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "ipso r75.46", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.670.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.378.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.27" }, { "model": "qlogic gb intelligent pass-thru module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87.10.1.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1037" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.611.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1060" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.300.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.509.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.387.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.3" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.290.0" }, { "model": "oceanstor s5500t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7970" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.50" }, { "model": "gaia os r75.0", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.386.0" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.15" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1056.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.839.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1277.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.764.0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.616.0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.66" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.105" }, { "model": "nexus intercloud for vmware", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.45" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.564.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1046" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1081.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.868.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.2" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.42" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1.72" }, { "model": "oceanstor s6800t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.397.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.70" }, { "model": "secureplatform r70.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.99" }, { "model": "oceanstor n8000 oceanstor s2300", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v100" }, { "model": "prime collaboration provisioning", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.85" }, { "model": "security access manager for enterprise single sign-on", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.7" }, { "model": "move antivirus multi-platform", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "ib6131 40gb infiniband switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.491.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.74" }, { "model": "exadata storage server software", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "nsm3000 appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1054.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.1" }, { "model": "espace u2990 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1289.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.58" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.825.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.814.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.600.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.566.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.137" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.877.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.860.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.475.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1070.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.102" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.2" }, { "model": "local collector appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.2.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.958.1" }, { "model": "gaia r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.94" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.16" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.3" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.11" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.31" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4" }, { "model": "oceanstor s8100 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "gaia embedded r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.108" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.32" }, { "model": "vcenter application discovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1020.0" }, { "model": "enterprise linux els", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.614.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.57" }, { "model": "gaia embedded r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.344.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.9" }, { "model": "move antivirus multi-platform", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.235" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.156.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.111" }, { "model": "flashsystem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.18" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.715.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7535061.121.225.06100" }, { "model": "service control engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "80000" }, { "model": "secureplatform r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "t620 flexible dual core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "oceanstor s6800t v100r005c50", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.17" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.505.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1063.0" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.286.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "gaia embedded r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor vis6600t v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.15" }, { "model": "vcloud automation center application services", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.723.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.725.0" }, { "model": "oceanstor 9000e v100r002c19", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storefabric h-series switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.224" }, { "model": "ipso r70.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.8" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.52" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.358.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.2" }, { "model": "vcenter infrastructure navigator", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.754.0" }, { "model": "ipso r75", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1007" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1659.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.783.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.19" }, { "model": "ios-xr", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1047" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1052" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.78" }, { "model": "gaia r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1690.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.687.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.308" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.820.0" }, { "model": "associates user activity reporting module", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1044.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.109" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "infosphere balanced warehouse c3000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.432.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.731.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.89" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.560.0" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.819.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.324.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1048" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1032.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.162" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.433.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.153" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1687.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.903.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.733.0" }, { "model": "gaia r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "t610 plus flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.749.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.113" }, { "model": "ediscovery identification and collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.762.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.719.0" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.12" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.72" }, { "model": "secureplatform r70.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.271.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.813.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.7" }, { "model": "oceanstor dorado5100 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.211" }, { "model": "oceanstor s2600t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.673.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.622.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1063.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.187" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.383.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.790.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.319" }, { "model": "esight uc\u0026c v100r001c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.658.1" }, { "model": "vcenter server appliance patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.8" }, { "model": "fusionmanager v100r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.37" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "secureplatform r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.932.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.101" }, { "model": "oceanstor s6800t v100r005c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1064.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.0" }, { "model": "power hmc r7.8.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1651.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.6" }, { "model": "espace u2990 v200r001c10spc102", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1003.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.391.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.107" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1664.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.18" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "ios-xe for catalyst air-ct5760", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtual pgw softswitch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "22000" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7238" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.2" }, { "model": "video surveillance media server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.81" }, { "model": "prime network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.755.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1031" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.18" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "elog v100r003c01spc506", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1007.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.326.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1680.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.11" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.23" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1010" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.113" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.337" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.28" }, { "model": "intelligent automation for cloud", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7530061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.29" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.3" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "78000" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.37" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1051" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.98" }, { "model": "oceanstor s5500t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "telepresence te software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "secureplatform r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.896.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.59" }, { "model": "secureplatform r71", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "secureplatform r70.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "socialcast on premise", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.152" }, { "model": "e6000 blade server bh620 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.417.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.218" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.334" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.657.0" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.0" }, { "model": "isoc v200r001c02spc203", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1049" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7242" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.331" }, { "model": "secureplatform r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.4" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9393" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1057" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1673.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.689.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.152" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.55" }, { "model": "qradar incident forensics mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1288.0" }, { "model": "gtsoftx3000 v200r001c01spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.390.0" }, { "model": "rack server rh2485 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1655.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.707.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.76" }, { "model": "secureplatform r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "gaia r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "algo one managed data service on cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1081.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1011.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1067.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1664.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "oceanstor vis6600 v100r002c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.801.0" }, { "model": "nexus running nxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1048.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.807.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.865.0" }, { "model": "espace cad v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1296.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.481.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.489.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.9" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.55" }, { "model": "ipso r75.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.97" }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "elog v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7556061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.69" }, { "model": "enterprise content delivery service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.50" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.510" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.96" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.8" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77750" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.572.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "ipso r75.47", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.786.0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "36.0.1985.122" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.20" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.59" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1039.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.836.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.23" }, { "model": "oceanstor dorado2100 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.1" }, { "model": "ace application control engine module for the cisco catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.591.0" }, { "model": "flex system 40gb ethernet", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.107" }, { "model": "secureplatform ngx r65", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.278.0" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.413.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.95" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.67" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.580.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.123" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.146" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.4" }, { "model": "chrome", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "38.0.2125.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.513.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.30" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "nsmexpress", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1042" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.158.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.761.1" }, { "model": "oceanstor sns2120 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.30" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.130" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.765.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.553.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.494.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.745.0" }, { "model": "ipso r71", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.484.0" }, { "model": "vsphere big data extensions", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.15" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.52" }, { "model": "oceanstor cse v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1061.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.829.1" }, { "model": "oceanstor hvs88t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.35" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.482.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.32" }, { "model": "aura communication manager ssp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "telepresence te software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ipso r70.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "prime collaboration deployment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.76" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.677.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.890.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.770.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.364.0" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "c-series nexus 5k switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.349.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.69" }, { "model": "unified computing system b-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "studio", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.37" }, { "model": "workbench", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "application and content networking system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.15" }, { "model": "system storage san48b-5 2498-f48", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "gaia r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.83" }, { "model": "gaia r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7845" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.63" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75560" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1297.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1026" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1068.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.33" }, { "model": "secureplatform r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.10" }, { "model": "fusionstorage dsware v100r003c02spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.762.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.1" }, { "model": "services provisioning platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "privileged identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1.1" }, { "model": "secureplatform r75.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "power hmc r7.3.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.723.1" }, { "model": "websphere process server hypervisor edition for red hat", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.884.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1038" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1068.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.621.0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.310" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.14" }, { "model": "espace v1300n v1300n v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.36" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.12" }, { "model": "puredata system for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1006" }, { "model": "smartcloud provisioning fixpack interi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.14" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.811.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.709.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.43" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.54" }, { "model": "oceanstor uds v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.882.0" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13000" }, { "model": "enterprise linux eus 5.9.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.384.0" }, { "model": "secureplatform r75.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia r70.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.111" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.19" }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.44" }, { "model": "power hmc r7.7.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.721.1" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.750.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.563.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.24" }, { "model": "2417-c48", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.193.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.771.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.59" }, { "model": "enterprise s-jis service", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.43" }, { "model": "diagnostic server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.8" }, { "model": "oceanstor s5500 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ipso r77.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.906.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.24" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.6" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.114" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.202" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.363.0" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.601.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1306.0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.14" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.812.0" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7245" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.944.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.635.0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7525061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.89" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77550" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "5955" }, { "model": "oceanstor s3900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.156" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1660.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1047.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.44" }, { "model": "aura communication manager ssp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.473.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.441.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.1" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "oceanstor s5500t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1040" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1037.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.0" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.53" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.426.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.752.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.5" }, { "model": "oceanstor n8500 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.834.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.327.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1654.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.112" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "oceanstor s5800t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "t410 all-in-one rfx/hdx smart zc", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.15" }, { "model": "webex node", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.493.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.103" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.327" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.186" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.10" }, { "model": "ipso ngx r65", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.956.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1662.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.217" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491036" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.108" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.7" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "system storage san768b", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-384" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.522.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.38" }, { "model": "data center analytics framework", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.30" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.622.1" }, { "model": "fusioncompute v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storeall os", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.91" }, { "model": "digital media players", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.159" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mirage gateway", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1062.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.152.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.556.0" }, { "model": "oceanstor vtl3500 v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.53" }, { "model": "identity engines ignition server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.161" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.772.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1059.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.29" }, { "model": "ipso r70", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.398.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.140" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.53" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.321" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.870.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1006.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.91" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.14127" }, { "model": "secure access remote access concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1653.1" }, { "model": "virtualization experience client", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "62150" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1083.0" }, { "model": "nexus virtual supervisor module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.301" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.335" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.695.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1021" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1688.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.325" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.732.0" }, { "model": "video distribution suite for internet streaming vds-is", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1290.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.26" }, { "model": "vcloud usage meter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.712.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1286.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.558.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.822.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.120" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.665.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.629.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "bash shell for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.14.8" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.13974" }, { "model": "oceanstor s5800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.0" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.339" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.763.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.947.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1276.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.168" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.878.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.542.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1663.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.48" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.837.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1014" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.43" }, { "model": "aura application server sip core pb3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "high-density server xh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.929.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.324" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.510.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.1549" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.410.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.787.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.323" }, { "model": "oceanstor 9000e v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.82" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.292.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.405.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.684.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.796.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.153.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.4" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.6" }, { "model": "ios-xe for catalyst 3k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1076.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.123" }, { "model": "gaia embedded r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7830" }, { "model": "system networking san96b-5 2498-f96", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.103" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "57100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.757.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.40" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "8900" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.832.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1066.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.50" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.316" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.1" }, { "model": "rack server rh5885h v100r003c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.221.8" }, { "model": "ipso r75.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.403.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.0" }, { "model": "powervu d9190 conditional access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.304.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1018.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1278.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.229" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.572.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.146" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.139" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1282.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.303.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.4" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "gaia embedded r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.26" }, { "model": "aura communication manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.51" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.21" }, { "model": "elog v200r003c10spc202", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "e9000 blade server ch121 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.436.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.21" }, { "model": "totalstorage san16b-2 fabric switch 2005-b16", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1030.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.340" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.45" }, { "model": "move", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1689.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.2" }, { "model": "uma v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.81" }, { "model": "aura communication manager ssp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.343" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.679.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.38" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.893.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.644.0" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.70" }, { "model": "network configuration and change management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "associates customer experience manager transaction impact monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "ip deskphones", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.570.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.17" }, { "model": "totalstorage san256b director model m48 2109-m48", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.81" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.313.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.351.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.933.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.10" }, { "model": "gaia os r76.0", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor s5800t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "ipso r75.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.887.0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.3" }, { "model": "advanced threat defense", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7755061.090.224.30300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.23" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1288.1" }, { "model": "exalogic", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "oceanstor uds v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.36" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1498.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.793.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.1" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1301.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.71" }, { "model": "system storage san24b-4 2498-b24", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.29" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core pb25", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1043.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1000.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.317" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.909.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.886.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.14" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "36550" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.318" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.115" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.936.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.488.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.526.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.56" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0.3" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.808.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.287.0" }, { "model": "telepresence", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.584.0" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1042.0" }, { "model": "bash rc1", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.33" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.907.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.120" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7232" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.29" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1685.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.25" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.81" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.823.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.791.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.577.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.8" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "oceanstor s5800t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1061.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.91" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10500" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7765061.090.225.06200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.676.0" }, { "model": "virtual library system", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.525.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.10" }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.681.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.309" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.97" }, { "model": "ironport encryption appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.214" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "oceanstor s6900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1050" }, { "model": "storeonce gen backup software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "22.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.135" }, { "model": "oceanstor css v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.11" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.950.0" }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.78" }, { "model": "secureplatform r75.40vs", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oneview", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.613.0" }, { "model": "espace meeting v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.32" }, { "model": "system networking san96b-5 2498-n96", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.182.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1276.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.163" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.304" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.162" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77650" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.1.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.305" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.862.0" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.023" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.464.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.682.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.15" }, { "model": "protectier enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "services vm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.940.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.5" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "oceanstor css v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.22" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "smart care", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1683.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.48" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.376.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.50" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1025" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.921.3" }, { "model": "oceanstor uds v100r002c00lvdf0", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.17" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "oceanstor s5600t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.10" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.155" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.538.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.519.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1041.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.69" }, { "model": "high-density server dh321 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.561.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1306.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1311.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.586.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.93" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "storeever esl g3 tape library", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.766.0" }, { "model": "element management system", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.740.0" }, { "model": "proactive network operations center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.50" }, { "model": "gaia r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.45" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "email and web security appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.6" }, { "model": "espace ivs v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.830.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.75" }, { "model": "oceanstor s5500t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.399.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.131" }, { "model": "advanced threat defense", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.2" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.2" }, { "model": "oceanstor s2600t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.925.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.64" }, { "model": "oceanstor n8300 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.864.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1076.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.9" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.63" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7765061.090.224.30300" }, { "model": "it business management suite", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "oceanstor s5600t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "t620 plus flexible quad core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.208" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1682.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.959.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.106" }, { "model": "oceanstor v100r001c01", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.27" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.624.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.40" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.156" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.26" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.18" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1293.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.38" }, { "model": "oceanstor s5500 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1654.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.698.0" }, { "model": "secureplatform r75.46", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.13" }, { "model": "ipso r71.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1079.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.338" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.598.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.89" }, { "model": "high-density server xh321 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1287.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.894.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.30" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "data recovery", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1061" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.906.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.737.0" }, { "model": "oceanstor s5800t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.1" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.214" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.21" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.23" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1672.2" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.52" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.9." }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.54" }, { "model": "oceanstor v100r001c02", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v1500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.7" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.320" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.124" }, { "model": "nsx for vsphere", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.81" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3090" }, { "model": "services vm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.311" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.693.0" }, { "model": "oceanstor vtl6900 v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.736.0" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.4" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9303" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.1.1538" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1069.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1019.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.606.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.438.0" }, { "model": "encryption switch 2498-e32", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.3" }, { "model": "oceanstor css v100r001c05", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.120" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.11" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7235" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.209" }, { "model": "idp series", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.113" }, { "model": "phaser r14-12 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7800081.150.104.35600" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1299.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.226" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.869.0" }, { "model": "dc v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.738.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.231" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.32" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "gaia r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.2" }, { "model": "secureplatform r71.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oceanstor s5800t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.13" }, { "model": "secureplatform ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.578.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.54" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.63" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.29" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.958.0" }, { "model": "agile controller v100r001c00spc205", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.380.0" }, { "model": "cloud single sign on", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.809.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5(2)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1681.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.3" }, { "model": "gaia embedded r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.361.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1018" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "hyperdp oceanstor n8500 v200r001c91", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.701.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.780.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.116" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.605.0" }, { "model": "t620 plus flexible dual core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1051.0" }, { "model": "physical access gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.51" }, { "model": "ipso r71.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "secure access link policy server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.49" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.55" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.663.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.537.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "phaser r14-12 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "6700081.140.105.00700" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1275.0" }, { "model": "oic v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.133" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.96" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.9" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1046.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.122" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "t610 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1062" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.934.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1020" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.469.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.9" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1080.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.67" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.0" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "espace uc v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "2054-e11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.4" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "secureplatform r70.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.951.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.55" }, { "model": "gaia r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.4" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7775061.090.225.06200" }, { "model": "oceanstor s2200t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.0" }, { "model": "netflow collection agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.130" }, { "model": "infosphere balanced warehouse c4000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.414.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.55" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.332" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.85" }, { "model": "unified communications domain manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.108" }, { "model": "secure access control server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.688.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1050.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.479.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.11" }, { "model": "oceanstor s5600 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.960.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.838.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.394.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1" }, { "model": "oceanstor s2600 v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.718.0" }, { "model": "secureplatform r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "uma-db v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.890.1" }, { "model": "oceanstor s2200t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "service control engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.20" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.528.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.30" }, { "model": "rack server rh2288e v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1676.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.100" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.62" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491064" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.84" }, { "model": "sal gw virtual app", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.25" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1023.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.325.0" }, { "model": "high-density server xh320 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.33" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.57" }, { "model": "secure access core concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.46" }, { "model": "espace vtm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.724.0" }, { "model": "oceanstor hdp3500e v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.431.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.10" }, { "model": "configuration and orchestration manager com", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.47" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.498.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.51" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.406.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.938.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.515.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1294.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.36" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.2.1" }, { "model": "fusionaccess v100r005c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.91275" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.409.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.68" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.4" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.315.0" }, { "model": "network convergence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.741.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.170.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.588.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.75" }, { "model": "galax8800 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1045.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.799.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.104" }, { "model": "secureplatform r77.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1073.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.152" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.792.0" }, { "model": "secureplatform r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "ipso r71.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "storefabric c-series mds switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "gaia embedded r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.9" }, { "model": "uma v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1667.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.21" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.1" }, { "model": "omm solution v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.322" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1279.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.272.0" }, { "model": "secureplatform r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.97" }, { "model": "gaia embedded ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "associates application performance management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.411.0" }, { "model": "oceanstor vtl6000 v100r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.47" }, { "model": "elog v100r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.367.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1045" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1016" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.454.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.634.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.53" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "oceanstor s5800t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1029.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.2" }, { "model": "fusionstorage dsware v100r003c02spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.337.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.54" }, { "model": "message networking sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.43" }, { "model": "e9000 blade server ch222 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1032" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1302.0" }, { "model": "nexus switch for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v70004.1.(2)" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.51" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.10" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.945.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.1" }, { "model": "network performance analytics", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1666.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.895.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.355.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "supercluster", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.21" }, { "model": "e9000 blade server ch221 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.49" }, { "model": "gaia r75", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1272.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.234" }, { "model": "galax8800 v100r002c85", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.21" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.103" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "big data appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.650.0" }, { "model": "gaia embedded r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.19" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.8" }, { "model": "oceanstor s6800t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.338.0" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.451.0" }, { "model": "vsphere app ha", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.135" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.59" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1301.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.29" }, { "model": "saas web protection", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.868.0" }, { "model": "agile controller v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1304.1" }, { "model": "webex pcnow", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.19" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.4" }, { "model": "oceanstor s6800t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "qlogic 20-port 8gb san switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.10.1.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.45" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "oceanstor cse v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.15" }, { "model": "power hmc r8.1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.0" }, { "model": "web element manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime network services controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.427.0" }, { "model": "e9000 blade server ch242 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "ipso r70.1", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1024" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.16" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.43" }, { "model": "oceanstor s5500t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.276.0" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.117" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "espace u2980 v100r001c10spc102", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.933.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.0" }, { "model": "netauthenticate", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.574.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.936.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.38" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.27" }, { "model": "3722-s51", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7775061.090.224.30300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.64" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.320.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.946.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.65" }, { "model": "ads virtual app", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.48" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.888.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.18" }, { "model": "access registrar appliance cisco prime access registrar applianc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1307.0" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.224.0" }, { "model": "rack server rh5885 v100r001c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1678.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.97" }, { "model": "socialminer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.704.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.149" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.60" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1035" }, { "model": "policy assessment and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "ipso r76", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1291.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.68" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.2" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "20500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.43" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "oceanstor 18800f v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.59" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3" }, { "model": "espace uc v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.41" }, { "model": "espace uc v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.632.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.158" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.154" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.328" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.9" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.2" }, { "model": "aura application server sip core pb26", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "vae v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.899.0" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.2" }, { "model": "websphere process server hypervisor edition for novell suse", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1029" }, { "model": "gaia r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.571.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.57" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1677.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.82" }, { "model": "esight network v200r003c10spc206", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.734.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.4" }, { "model": "gaia embedded r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura communication manager sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1310.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.34" }, { "model": "t505 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.342" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.93" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.485.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.678.0" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.16" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "virtual compute appliance software", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "puredata system for analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.372.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.949.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.638.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.392.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.212" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2053-4340" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.1" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1063" }, { "model": "gaia embedded r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.710.0" }, { "model": "sig9800 sig9800-x16 v300r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.206" }, { "model": "fusioncompute v100r003c10cp6001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.11" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1685.0" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3070" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.735.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.568.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.487.0" }, { "model": "ipso r70.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.129" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.9" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.590.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.113" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.23" }, { "model": "rack server rh5885 v100r003c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "gaia r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "system storage san04b-r 2005-r04", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.332.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.953.0" }, { "model": "oceanstor s2600t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.666.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1071.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1013.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "collaboration pod on vmware vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.41" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.23988" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.340.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57450" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.373.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.2" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.50" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.353.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.2" }, { "model": "gaia r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7228" }, { "model": "oceanstor s6900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.26" }, { "model": "policy assessment and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.47" }, { "model": "secureplatform r75.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.470.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.461.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.1" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.446.0" }, { "model": "secureplatform r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "move firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.88" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.5" }, { "model": "nsmxpress appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.357.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.459.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.541.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.221" }, { "model": "espace u2980 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.18" }, { "model": "nexus switch for nexus series 4.1 e1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v4000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.333.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.779.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.57" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.42" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "6655" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.9" }, { "model": "bsc6000 v900r008c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.307" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1027" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.396.0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.157" }, { "model": "bsc6000 v901r013c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.428.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1035.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.767.0" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9301" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.891.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.460.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1001.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.87" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.2" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "galax8800 v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r71.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1053" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.74" }, { "model": "viewplanner", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.8" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "5945" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.455.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1014.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.449.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.142" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.620.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.497.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.82" }, { "model": "oceanstor s5900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.576.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1015.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.795.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "secureplatform r76", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.12" }, { "model": "gaia embedded r70.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.148" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1682.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.751.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.636.0" }, { "model": "secure access link gas", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "oceanstor s5300 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.313" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.5" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "65.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.12" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.64" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.5" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.456.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.831.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.65" }, { "model": "saas email protection", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.0" }, { "model": "oceanstor s6800t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.38" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "secureplatform r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.111" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.550.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.583.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.595.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1009" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.131" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.154.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.94" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.866.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1673.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.101" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7545061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.131" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.15" }, { "model": "secureplatform r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.128" }, { "model": "configuration and orchestration manager vps", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.62" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-320" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.653.0" }, { "model": "aura application server sip core pb16", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1656.1" }, { "model": "associates layer api management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.35" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.713.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.643.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.22" }, { "model": "fusioncompute v100r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.228" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.504.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.12" }, { "model": "ipso r71.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "unstructured data identification and mgmt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.767.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1292.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1058.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-370" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.129" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.21" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.41" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.14150" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.218" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.05" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.4" }, { "model": "gaia r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.68" }, { "model": "espace dcm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.359.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.26" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.83" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.565.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.3" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.567.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37586" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.33" }, { "model": "oceanstor cse v100r002c00lsfm01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.238" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.656.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.55" }, { "model": "ip flow manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.53" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.022" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1011" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1033.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.788.0" }, { "model": "gaia embedded r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.691.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70152" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:gnu:bash", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004432" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "128716" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "128760" } ], "trust": 0.7 }, "cve": "CVE-2014-7186", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2014-7186", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-7186", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-7186", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201409-1072", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2014-7186", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. GNU Bash is prone to a local memory-corruption vulnerability. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nGNU Bash 3.2 and later are vulnerable; prior versions may also be affected. \n\nNOTE: This vulnerability can only be exploited if the attacker already has\nvalid administrative login credentials. \n-----BEGIN PGP SIGNED MESSAGE-----\n\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\n\n\nIssued: October 01, 2014\nUpdated: October 03, 2014\n\n\nCA Technologies is investigating multiple GNU Bash vulnerabilities, \nreferred to as the \"Shellshock\" vulnerabilities, which were publicly \ndisclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, \nCVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and \nCVE-2014-6278 have been assigned to these vulnerabilities. \n\nThe CA Technologies Enterprise Information Security team has led a \nglobal effort to identify and remediate systems and products discovered \nwith these vulnerabilities. We continue to patch our systems as fixes \nbecome available, and we are providing fixes for affected CA \nTechnologies products. \n\nCA Technologies continues to aggressively scan our environments \n(including servers, networks, external facing applications, and SaaS \nenvironments) to proactively monitor, identify, and remediate any \nvulnerability when necessary. \n\n\nRisk Rating\n\nHigh\n\n\nPlatform\n\nAIX\nAndroid (not vulnerable, unless rooted)\nApple iOS (not vulnerable unless jailbroken)\nLinux\nMac OS X\nSolaris\nWindows (not vulnerable unless Cygwin or similar ported Linux tools \n with Bash shell are installed)\nOther UNIX/BSD based systems if Bash is installed\nAny other OS or JeOS that utilizes Bash\n\n\nAffected Products\n\nThe following products have been identified as potentially vulnerable, \nand we have made fixes available for all of these products. \n\nCA API Management (Linux appliance only)\n\nCA Application Performance Management (TIM is the only affected APM \n component)\n\nCA Application Performance Management Cloud Monitor\n\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM)\n\nCA Layer 7 products (API Gateway, Mobile Access Gateway, API Management \n Portal)\n\nCA User Activity Reporting Module (Enterprise Log Manager)\n\nNote: This security notice will be updated if other CA Technologies \nproducts are determined to be vulnerable. \n\nIn most cases, the Bash vulnerabilities will need to be patched by OS \nvendors. Exceptions may include CA Technologies appliances, and \nsoftware products that include Linux, UNIX or Mac OS X based operating \nsystems (that include Bash). \n\n\nAffected Components\n\nCentOS\nCygwin\nGNU Bash\nRed Hat Enterprise Linux\nSUSE Linux\n\n\nNon-Affected Products\n\nIMPORTANT NOTE: This listing includes only a small subset of the \nunaffected CA Technologies products. We\u0027re including unaffected \nproducts that customers have already inquired about. While the \nfollowing CA Technologies products are not directly affected by the \nBash vulnerabilities, the underlying operating systems that CA \nTechnologies software is installed on may be vulnerable. We strongly \nencourage our customers to follow the recommendations provided by their \nvendors for all operating systems they utilize. \n\nAll CA SaaS / On Demand products were either not vulnerable or have \nalready been patched. \n\nCA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does \nnot execute CGI scripts, or spawn or execute shell commands from within \nthe app. AHS infrastructure already patched. \n\nCA Asset Portfolio Management\n\nCA AuthMinder (Arcot WebFort)\n\nCA AuthMinder for Business Users\n\nCA AuthMinder for Consumers\n\nCA AutoSys products - We use the bash shell that comes with the \noperating system and the customer is responsible for patching their OS. \nAdditionally, the agents themselves do not distribute any scripts that \nuse bash. \n\nCA Clarity On Demand\n\nCA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or \nuse it, but because we are deployed on RHEL, customers may be \nindirectly affected. Customers using RHEL should apply patches provided \nby Red Hat. \n\nCA Console Management for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA ControlMinder\n\nCA DataMinder (formerly DLP) products \u2013 Software and appliance \nconfirmed not vulnerable. Note: Linux Agents shipped, but no public SSH \nor Web apps are used in these agents. Customers should patch bash shell \non any Linux server with DataMinder agents. DataMinder agents should \ncontinue to function normally. \n\nCA Digital Payments SaaS (previously patched)\n\nCA Directory\n\nCA eCommerce SaaS / On Demand (previously patched)\n\nCA Endevor Software Change Manager\n\nCA Federation (formerly SiteMinder Federation)\n\nCA GovernanceMinder\n\nCA IdentityMinder\n\nCA Infrastructure Management\n\nCA JCLCheck\n\nCA Job Management for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA NetQoS GigaStor Observer Expert\n\nCA Network Flow Analysis\n\nCA Performance Management for OpenVMS - Our OpenVMS products do not \nbundle bash, and they do not supply bash scripts; we use nothing but \nthe native DCL CLI. \n\nCA RiskMinder\n\nCA Service Desk Manager\n\nCA Service Operations Insight (SOI)\n\nCA SiteMinder\n\nCA SOLVE:Access\n\nCA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes \nfrom your underlying operating system vendor. \n\nCA Strong Authentication\n\nCA System Watchdog for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA Top Secret\n\nCA Universal Job Management Agent for OpenVMS - Our OpenVMS products do \nnot bundle bash, and they do not supply bash scripts; we use nothing \nbut the native DCL CLI. \n\nCA Virtual Assurance for Infrastructure Managers (VAIM)\n\n\nSolution\n\nCA Technologies has issued the following fixes to address the \nvulnerabilities. \n\nCA API Management:\nPatches for Linux appliance are available through CA Support to \ncustomers of Gateway (applicable for all versions \u2013 6.1.5, 6.2, 7.0, \n7.1, 8.0, 8.1, 8.1.1, 8.1.02). \n\nCA Application Performance Management:\nKB article for APM TIM has been published. APM TIM is the only part of \nAPM that was affected. Refer to TEC618037. \n\nCA Application Performance Management Cloud Monitor:\nNew images are available for subscribers. Download the latest OPMS \nversion 8.2.1.5. For assistance, contact CA Support. \n\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM):\nVery low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do \nnot use Bash at all for the CEM operating system that we have shipped \nin the past. This means that customers who patch the OS will not impact \nthe ability of the CEM TIMsoft from operating. However prior to version \n9.6, the TIM installation script does use the bash shell. See new KB \narticle TEC618037 for additional information. \n\nCA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal):\nFixes for all Bash vulnerabilities and a security bulletin are available \non the Layer 7 Support website. \n\nCA User Activity Reporting Module (Enterprise Log Manager):\nAll 12.5 and 12.6 GA versions are potentially affected. Patches \nprovided on 2014-09-30. To get the patch, use the OS update \nfunctionality to get the latest R12.6 SP1 subscription update. Note \nthat you can update R12.5 SPx with the R12.6 SP1 OS update. For \nassistance, contact CA Support. \n\n\nWorkaround\n\nNone\n\nTo help mitigate the risk, we do strongly encourage all customers to \nfollow patch management best practices, and in particular for operating \nsystems affected by the Bash Shellshock vulnerabilities. \n\n\nReferences\n\nCVE-2014-6271 - Bash environment variable command injection\nCVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271\nCVE-2014-7186 - Bash parser redir_stack memory corruption\nCVE-2014-7187 - Bash nested flow control constructs off-by-one\nCVE-2014-6277 - Bash untrusted pointer use uninitialized memory\nCVE-2014-6278 - Bash environment variable command injection\n\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\n\n\nChange History\n\nv1.0: 2014-10-01, Initial Release\nv1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, \n Clarity OD, All SaaS/OD products to list of Non-Affected Products. \nv1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated \n UARM solution info. \n\n\nIf additional information is required, please contact CA Technologies \nSupport at https://support.ca.com. \n\nIf you discover a vulnerability in CA Technologies products, please \nreport your findings to the CA Technologies Product Vulnerability \nResponse Team at vuln@ca.com. \nPGP key:\nsupport.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782\n\nSecurity Notices\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\n\n\nRegards,\nKen Williams\nDirector, Product Vulnerability Response Team\nCA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com\nKen.Williams@ca.com | vuln@ca.com\n\n\nCopyright \u00a9 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. \n11749. All other trademarks, trade names, service marks, and logos \nreferenced herein belong to their respective companies. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: Encryption Desktop 10.3.2 (Build 15238)\nCharset: utf-8\n\nwsBVAwUBVDK+PZI1FvIeMomJAQFl/Af/TqrSE/h4r3gs9PwrWKdt21PCRI3za9Lx\nM5ZyTdVDIQ9ybgPkLqsovNRPgVqd7zwDHsx0rzvF5Y82uO+vQ63BuEV2GnczAax/\nEiAW4WVxUgWG+lAowGV55Of8ruv/gOiAWTjFhkqpsyVg96ZMw2HLG62IwZL1j0qa\noLCu0y3VrGvqH0g2hi75QwHAjNCdlEsD4onUqTCc9cRTdLwFCZrUQ8KTrqIL7LK5\nUo5T9C1UeAyNTo3KiJ/zw3BCOTkpl99dmg3NW0onU/1r1CXdlyS7opLB+GJ+xGwP\nxRQdUsOIhzfRzx7bsao2D43IhDnzJBBFJHdeMPo18WBTfJ7aUgBwGQ==\n=B62b\n-----END PGP SIGNATURE-----\n. \nNote: All versions of HP Thin Pro and HP Smart Zero Core operating systems\nprior to version 5.1.0 are affected by these vulnerabilities. Following is a\ncomplete list of affected operating systems and Hardware Platforms Affected. \n\nNote: If you participated in the ThinPro 5.1.0 beta program then upgrade to\nthe release version as soon as it becomes available. \n\nHP ThinPro and HP Smart Zero Core (x86)\n v5.0.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-5.0-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (x86)\n v4.4.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.4-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (ARM)\n v4.4.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.4-arm.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (X86)\n v4.1, v4.2, and v4.3\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (ARM)\n v4.1, v4.2, and v4.3\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-arm.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (X86)\n v3.1, v3.2, and v3.3\n Download softpaq sp69382 from:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an\nupdate package as: bash_4.1-3+deb6u2_i386.deb . \n\nHP ThinPro and HP Smart Zero Core (ARM)\n v3.1, v3.2, and v3.3\n Download softpaq sp69382 from:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an\nupdate package as: bash_4.1-3+deb6u2_armel.deb . \n\nHP ThinPro and HP Smart Zero Core\n v2.x and earlier\n An update will be made available for customers upon request\n\nHISTORY\nVersion:1 (rev.1) - 03 October 2014 Initial release\nVersion:2 (rev.2) - 06 November 2014 Updated List of CVEs, Updated impacted\nproducts, Updated resolution table\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. Summary:\n\nAn updated rhev-hypervisor6 package that fixes several security issues is\nnow available. Relevant releases/architectures:\n\nRHEV-M 3.4 - noarch\n\n3. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. \n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. \n\n HP StoreEver ESL E-series Tape Library\n\n - Disable DHCP and only use static IP addressing. \n\n HP Virtual Library System (VLS)\n\n - Disable DHCP and only use static IP addressing. \n\nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: bash security update\nAdvisory ID: RHSA-2014:1311-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html\nIssue date: 2014-09-26\nCVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 \n=====================================================================\n\n1. Summary:\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. 4 ELS) - i386, ia64, x86_64\nRed Hat Enterprise Linux AUS (v. 6.2 server) - x86_64\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64\nRed Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64\n\n3. Description:\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). \n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create Bash functions as environment variables\nneed to be made aware of the changes to the way names are handled by this\nupdate. For more information see the Knowledgebase article at\nhttps://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes. \n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. Solution:\n\nBefore applying this update, make sure all previously released errata \nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)\n\n6. Package List:\n\nRed Hat Enterprise Linux AS (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nia64:\nbash-3.0-27.el4.4.i386.rpm\nbash-3.0-27.el4.4.ia64.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.ia64.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux ES (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux LL (v. 5.6 server):\n\nSource:\nbash-3.2-24.el5_6.2.src.rpm\n\ni386:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\n\nia64:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-3.2-24.el5_6.2.ia64.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.ia64.rpm\n\nx86_64:\nbash-3.2-24.el5_6.2.x86_64.rpm\nbash-debuginfo-3.2-24.el5_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux EUS (v. 5.9 server):\n\nSource:\nbash-3.2-32.el5_9.3.src.rpm\n\ni386:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\n\nia64:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-3.2-32.el5_9.3.ia64.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.ia64.rpm\n\nppc:\nbash-3.2-32.el5_9.3.ppc.rpm\nbash-debuginfo-3.2-32.el5_9.3.ppc.rpm\n\ns390x:\nbash-3.2-32.el5_9.3.s390x.rpm\nbash-debuginfo-3.2-32.el5_9.3.s390x.rpm\n\nx86_64:\nbash-3.2-32.el5_9.3.x86_64.rpm\nbash-debuginfo-3.2-32.el5_9.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux AUS (v. 6.2 server):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-4.1.2-9.el6_2.2.x86_64.rpm\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-4.1.2-15.el6_4.2.i686.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-4.1.2-15.el6_4.2.ppc64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-4.1.2-15.el6_4.2.s390x.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\nbash-doc-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\nbash-doc-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\nbash-doc-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\nbash-doc-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-7169.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7186.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7187.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1200223\n\n8. \n\nRelease Date: 2014-12-16\nLast Updated: 2014-12-16\n\nPotential Security Impact: Remote code execution\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP Vertica. \n\nReferences:\n\nCVE-2014-6271\nCVE-2014-6277\nCVE-2014-6278\nCVE-2014-7169\nCVE-2014-7186\nCVE-2014-7187\nSSRT101827\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP Vertica AMI\u0027s and Virtual Machines prior to v7.1.1-0. \n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2104-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2104-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nWe recommend installing Vertica v7.1.1-0 or subsequent, or manually\ninstalling a new version of Bash, such as Bash43-027. \n\nHP has released the following updates to resolve this vulnerability for HP\nVertica products. \n\nUpdate to the latest VM image available at: https://my.vertica.com\n\nFor customers using the AMI version HP Vertica Analytics platform, please\ninstall the latest image available at Amazon. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being\ncommunicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletins\nvia Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\n\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n - check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n - verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile\nto update appropriate sections. \n\nTo review previously published Security Bulletins visit:\nhttp://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin relates to is\nrepresented by the 5th and 6th characters of the Bulletin number in the\ntitle: GN = HP General SW\n MA = HP Management Agents\n MI = Misc. 3rd Party SW\n\nMP = HP MPE/iX\n NS = HP NonStop Servers\n OV = HP OpenVMS\n\nPI = HP Printing \u0026 Imaging\n ST = HP Storage SW\n TL = HP Trusted Linux\n\nTU = HP Tru64 UNIX\n UX = HP-UX\n VV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to\nmaintain system integrity. HP is continually reviewing and enhancing the\nsecurity features of software products to provide customers with current\nsecure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the\nattention of users of the affected HP products the important security\ninformation contained in this Bulletin. HP recommends that all users\ndetermine the applicability of this information to their individual\nsituations and take appropriate action. HP does not warrant that this\ninformation is necessarily accurate or complete for all user situations and,\nconsequently, HP will not be responsible for any damages resulting from\nuser\u0027s use or disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either express or\nimplied, including the warranties of merchantability and fitness for a\nparticular purpose, title and non-infringement.\"\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for incidental,\nspecial or consequential damages including downtime cost; lost profits;\ndamages relating to the procurement of substitute products or services; or\ndamages for loss of data, or software restoration. The information in this\ndocument is subject to change without notice. Relevant Releases (Affected products for which remediation is present)\n\n vCenter Log Insight 2.0\n\n3. Problem Description \n\n a. Bash update for multiple products. \n\n Bash libraries have been updated in multiple products to resolve \n multiple critical security issues, also referred to as Shellshock. \n\n VMware products have been grouped into the following four\n product categories:\n \n I) ESXi and ESX Hypervisor\n ESXi is not affected because ESXi uses the Ash shell (through\n busybox), which is not affected by the vulnerability reported\n for the Bash shell. See table 1 for\n remediation for ESX. \n \n II) Windows-based products\n Windows-based products, including all versions of vCenter Server \n running on Windows, are not affected. \n\n III) VMware (virtual) appliances\n VMware (virtual) appliances ship with an affected version of Bash. \n See table 2 for remediation for appliances. \n \n IV) Products that run on Linux, Android, OSX or iOS (excluding\nvirtual\n appliances)\n\n Products that run on Linux, Android, OSX or iOS (excluding \n virtual appliances) might use the Bash shell that is part of the\n operating system. \n \n MITIGATIONS\n\n VMware encourages restricting access to appliances through\n firewall rules and other network layer controls to only trusted IP\n addresses. This measure will greatly reduce any risk to these\n appliances. \n\n RECOMMENDATIONS\n\n VMware recommends customers evaluate and deploy patches for\n affected products in Table 1 and 2 below as these\n patches become available. \n\n Column 4 of the following tables lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n Table 1 - ESXi and ESX Hypervisor\n =================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n ESXi any ESXi Not affected\n\n ESX 4.1 ESX Patch pending *\n\n ESX 4.0 ESX Patch pending *\n\n * VMware will make VMware ESX 4.0 and 4.1 security patches available \n for the Bash shell vulnerability. This security patch release is an \n exception to the existing VMware lifecycle policy. \n\n Table 2 - Products that are shipped as a (virtual) appliance. \n =============================================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n \n vCenter Server Appliance 5.x Linux Patch Pending\n Horizon DaaS Platform 6.x Linux Patch Pending\n Horizon Workspace 1.x, 2.x Linux Patch Pending\n IT Business Management Suite 1.x Linux Patch Pending\n NSX for Multi-Hypervisor 4.x Linux Patch Pending\n NSX for vSphere 6.x Linux Patch Pending\n NVP 3.x Linux Patch Pending\n vCenter Converter Standalone 5.x Linux Patch Pending \n vCenter Hyperic Server 5.x Linux Patch Pending\n vCenter Infrastructure Navigator 5.x Linux Patch Pending\n vCenter Log Insight 1.x, 2.x Linux 2.0 U1\n vCenter Operations Manager 5.x Linux Patch Pending\n vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending\n vCenter Site Recovery Manager 5.x Linux Patch Pending\n**\n vCenter Support Assistant 5.x Linux Patch Pending\n vCloud Automation Center 6.x Linux Patch Pending\n vCloud Automation Center\n Application Services 6.x Linux Patch Pending\n vCloud Director Appliance 5.x Linux Patch Pending\n vCloud Connector 2.x Linux Patch Pending\n vCloud Networking and Security 5.x Linux Patch Pending\n vCloud Usage Meter 3.x Linux Patch Pending\n vFabric Application Director 5.x, 6.x Linux Patch Pending\n vFabric Postgres 9.x Linux Patch Pending\n Viewplanner 3.x Linux Patch Pending\n VMware Application Dependency \n Planner x.x Linux Patch Pending\n VMware Data Recovery 2.x Linux Patch Pending\n VMware HealthAnalyzer 5.x Linux Patch Pending\n VMware Mirage Gateway 5.x Linux Patch Pending\n VMware Socialcast On Premise x.x Linux Patch Pending\n VMware Studio 2.x Linux Patch Pending\n VMware TAM Data Manager x.x Linux Patch Pending\n VMware Workbench 3.x Linux Patch Pending\n vSphere App HA 1.x Linux Patch Pending\n vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending\n vSphere Data Protection 5.x Linux Patch Pending\n vSphere Management Assistant 5.x Linux Patch Pending\n vSphere Replication 5.x Linux Patch Pending\n vSphere Storage Appliance 5.x Linux Patch Pending\n\n ** This product includes Virtual Appliances that will be updated, the\nproduct \n itself is not a Virtual Appliance. Solution\n\n vCenter Log Insight\n ----------------------------\n Downloads:\n https://www.vmware.com/go/download-vcenter-log-insight\n (click Go to Downloads)\n Documentation:\n http://kb.vmware.com/kb/2091065\n\n5. References\n \n VMware Knowledge Base Article 2090740\n http://kb.vmware.com/kb/2090740\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\n\n- ------------------------------------------------------------------------\n\n6. Change Log\n\n 2014-09-30 VMSA-2014-0010\n Initial security advisory in conjunction with the release of\n vCenter Log Insight 2.0 U1 on 2014-09-30. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Policy\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2014 VMware Inc. \n\n Note: HP and the switch vendor recommend running an active version of\nFabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge\n(SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around\ninformation provided in the MITIGATION INFORMATION section below to protect\nHP StoreFabric B-series switches from this vulnerability. \n\n Fabric OS (FOS) v7.3.0b (This version will be available soon and this\nbulletin will revised at that time)\n\n The following focused fix FOS versions are available for the previously\nreleased versions and have been renamed to include an additional hexadecimal\ncharacter appended to the FOS version on which it is based:\n\n FOS v7.2.1c1\n FOS v7.2.0d6\n FOS v7.1.2b1\n FOS v7.1.1c1\n FOS v7.1.0cb\n FOS v7.0.2e1\n FOS v7.0.0d1\n FOS v6.4.3f3\n FOS v6.4.2a3\n FOS v6.2.2f9\n\nMITIGATION INFORMATION\n\n HP recommends the following steps to reduce the risk of this vulnerability:\n\n - Place the HP StoreFabric SAN switch and other data center critical\ninfrastructure behind a firewall to disallow access from the Internet. \n - Change all HP StoreFabric switch default account passwords, including\nthe root passwords, from the default factory passwords. \n - Examine the list of accounts, including ones on the switch and those\nexisting on remote authentication servers such as RADIUS, LDAP, and TACAS+,\nto ensure only necessary personnel can gain access to HP StoreFabric FOS\nswitches. Delete guest accounts and temporary accounts created for one-time\nusage needs. \n - Utilize FOS password policy management to strengthen the complexity,\nage, and history requirements of switch account passwords. \n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login. \nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted", "sources": [ { "db": "NVD", "id": "CVE-2014-7186" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70152" }, { "db": "PACKETSTORM", "id": "128716" }, { "db": "PACKETSTORM", "id": "128567" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "128537" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "128457" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128760" }, { "db": "PACKETSTORM", "id": "129132" } ], "trust": 3.87 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=36933", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7186" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-7186", "trust": 4.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/28/10", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/26/2", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/25/32", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#252743", "trust": 2.0 }, { "db": "JVN", "id": "JVN55667175", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2014-000126", "trust": 1.9 }, { "db": "MCAFEE", "id": "SB10085", "trust": 1.4 }, { "db": "JUNIPER", "id": "JSA10648", "trust": 1.4 }, { "db": "PACKETSTORM", "id": "128517", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "128567", "trust": 1.2 }, { "db": "SECUNIA", "id": "61065", "trust": 1.1 }, { "db": "SECUNIA", "id": "61622", "trust": 1.1 }, { "db": "SECUNIA", "id": "61780", "trust": 1.1 }, { "db": "SECUNIA", "id": "61603", "trust": 1.1 }, { "db": "SECUNIA", "id": "61287", "trust": 1.1 }, { "db": "SECUNIA", "id": "61643", "trust": 1.1 }, { "db": "SECUNIA", "id": "61618", "trust": 1.1 }, { "db": "SECUNIA", "id": "60433", "trust": 1.1 }, { "db": "SECUNIA", "id": "61188", "trust": 1.1 }, { "db": "SECUNIA", "id": "61565", "trust": 1.1 }, { "db": "SECUNIA", "id": "61312", "trust": 1.1 }, { "db": "SECUNIA", "id": "61703", "trust": 1.1 }, { "db": "SECUNIA", "id": "61503", "trust": 1.1 }, { "db": "SECUNIA", "id": "61479", "trust": 1.1 }, { "db": "SECUNIA", "id": "62228", "trust": 1.1 }, { "db": "SECUNIA", "id": "60034", "trust": 1.1 }, { "db": "SECUNIA", "id": "60044", "trust": 1.1 }, { "db": "SECUNIA", "id": "61328", "trust": 1.1 }, { "db": "SECUNIA", "id": "59907", "trust": 1.1 }, { "db": "SECUNIA", "id": "61129", "trust": 1.1 }, { "db": "SECUNIA", "id": "60024", "trust": 1.1 }, { "db": "SECUNIA", "id": "61633", "trust": 1.1 }, { "db": "SECUNIA", "id": "61128", "trust": 1.1 }, { "db": "SECUNIA", "id": "61313", "trust": 1.1 }, { "db": "SECUNIA", "id": "60055", "trust": 1.1 }, { "db": "SECUNIA", "id": "61291", "trust": 1.1 }, { "db": "SECUNIA", "id": "62343", "trust": 1.1 }, { "db": "SECUNIA", "id": "61641", "trust": 1.1 }, { "db": "SECUNIA", "id": "61816", "trust": 1.1 }, { "db": "SECUNIA", "id": "62312", "trust": 1.1 }, { "db": "SECUNIA", "id": "60193", "trust": 1.1 }, { "db": "SECUNIA", "id": "60063", "trust": 1.1 }, { "db": "SECUNIA", "id": "61873", "trust": 1.1 }, { "db": "SECUNIA", "id": "58200", "trust": 1.1 }, { "db": "SECUNIA", "id": "61711", "trust": 1.1 }, { "db": "SECUNIA", "id": "61636", "trust": 1.1 }, { "db": "SECUNIA", "id": "61654", "trust": 1.1 }, { "db": "SECUNIA", "id": "61550", "trust": 1.1 }, { "db": "SECUNIA", "id": "61283", "trust": 1.1 }, { "db": "SECUNIA", "id": "61485", "trust": 1.1 }, { "db": "SECUNIA", "id": "61471", "trust": 1.1 }, { "db": "SECUNIA", "id": "61442", "trust": 1.1 }, { "db": "SECUNIA", "id": "61552", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97219505", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96447236", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU97220341", "trust": 0.8 }, { "db": "USCERT", "id": "TA14-268A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004432", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201409-1072", "trust": 0.6 }, { "db": "BID", "id": "70152", "trust": 0.4 }, { "db": "JUNIPER", "id": "JSA10661", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "36933", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-7186", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128716", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129068", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128537", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128864", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129132", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129264", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128763", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128457", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128456", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129617", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128760", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "BID", "id": "70152" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "PACKETSTORM", "id": "128716" }, { "db": "PACKETSTORM", "id": "128567" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "128537" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "128457" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128760" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "id": "VAR-201409-1147", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.41730924571428574 }, "last_update_date": "2024-11-28T22:27:19.471000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-01-27-4", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "title": "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "title": "HT205267", "trust": 0.8, "url": "https://support.apple.com/en-us/HT205267" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/en-us/HT204244" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT204244" }, { "title": "HT205267", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT205267" }, { "title": "bash-3.2-33.AXS3.4", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3918" }, { "title": "bash-4.1.2-15.AXS4.2", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3919" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "title": "CTX200217", "trust": 0.8, "url": "https://support.citrix.com/article/CTX200217" }, { "title": "CTX200223", "trust": 0.8, "url": "https://support.citrix.com/article/CTX200223" }, { "title": "GNU Bash", "trust": 0.8, "url": "http://www.gnu.org/software/bash/" }, { "title": "HPSBST03148 SSRT101749", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479974" }, { "title": "HPSBMU03143 SSRT101761", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479536" }, { "title": "HPSBMU03144 SSRT101762", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479492" }, { "title": "HPSBMU03182 SSRT101787", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04497042" }, { "title": "HPSBST03122 SSRT101717", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04471532" }, { "title": "HPSBMU03217 SSRT101827", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04512907" }, { "title": "HPSBST03131 SSRT101749", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04477872" }, { "title": "HPSBST03154 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04487558" }, { "title": "HPSBHF03125 SSRT101724", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04471538" }, { "title": "HPSBGN03233", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04540692" }, { "title": "HPSBST03129 SSRT101760", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04478866" }, { "title": "HPSBST03181 SSRT101811", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04496383" }, { "title": "HPSBGN03138 SSRT101755", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04475942" }, { "title": "HPSBMU03236 SSRT101830", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04552143" }, { "title": "HPSBGN03142 SSRT101764", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479402" }, { "title": "HPSBGN03141 SSRT101763", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479398" }, { "title": "HPSBMU03165 SSRT101783", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04497075" }, { "title": "HPSBMU03245 SSRT101742", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04556845" }, { "title": "HPSBST03157 SSRT101718", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04488200" }, { "title": "HPSBST03155 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04487573" }, { "title": "MIGR-5096315", "trust": 0.8, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "title": "T1021279", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "title": "1686447", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "title": "S1004897", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "title": "S1004898", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "title": "T1021272", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "title": "1686479", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "title": "1685749", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "title": "1686084", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "title": "1685914", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "title": "1685604", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "title": "1685433", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685433" }, { "title": "1685541", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "title": "1685733", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "title": "1685522", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685522" }, { "title": "S1004915", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "title": "1686131", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "title": "1686493", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686493" }, { "title": "S1004879", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "title": "1685798", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685798" }, { "title": "1686299", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686299" }, { "title": "1686635", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686635" }, { "title": "JSA10648", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "title": "\u30a2\u30e9\u30a4\u30c9\u30c6\u30ec\u30b7\u30b9\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831", "trust": 0.8, "url": "http://jvn.jp/vu/JVNVU97219505/522154/index.html" }, { "title": "OES11 SP2, OES11SP1, OES2 SP3 vulnerability with GNU Bash Remote Code Execution (aka ShellShock) and Mozilla NSS vulnerabilities", "trust": 0.8, "url": "https://www.novell.com/support/kb/doc.php?id=7015701" }, { "title": "ZENworks Configuration Management vulnerability with GNU Bash Remote Code Execution (aka ShellShock)", "trust": 0.8, "url": "https://www.novell.com/support/kb/doc.php?id=7015721" }, { "title": "AV14-003", "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "title": "Bash \"Shellshock\" Vulnerabilities - CVE-2014-7169", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "title": "NAS-201410-05", "trust": 0.8, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "title": "Bug 1141597", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "title": "Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169) in Red Hat Enterprise Linux", "trust": 0.8, "url": "https://access.redhat.com/solutions/1207723" }, { "title": "RHSA-2014:1354", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "title": "RHSA-2014:1306", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2014-1306.html" }, { "title": "Bash specially-crafted environment variables code injection attack", "trust": 0.8, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "title": "GNU Bash \u300cOS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u300d\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU252743.html" }, { "title": "SA82", "trust": 0.8, "url": "https://bto.bluecoat.com/security-advisory/sa82" }, { "title": "SOL15629", "trust": 0.8, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "title": "Multiple vulnerabilities in Bash", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash" }, { "title": "VMSA-2014-0010", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "title": "bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169 \u4ed6)\u306b\u3088\u308bHA8500\u3078\u306e\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_ha8500.html" }, { "title": "\u30b5\u30fc\u30d0\u30fb\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u88fd\u54c1 bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169\u4ed6)\u306b\u3088\u308b\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_cve20146271.html" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/112/1126/1126247_cisco-sa-20140926-bash-j.html" }, { "title": "GNU bash \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.iodata.jp/support/information/2014/bash/" }, { "title": "GNU Bash\u306b\u304a\u3051\u308bOS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://buffalo.jp/support_s/s20141002.html" }, { "title": "TLSA-2014-10", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2014/TLSA-2014-10j.html" }, { "title": "\u300cGNU Bash \u306b OS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u300d\u3078\u306e\u5bcc\u58eb\u901a\u88fd\u54c1\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/jvn-97219505.html" }, { "title": "bash4.1.2-15.el6_5.2.x86_64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54163" }, { "title": "bash-4.2-cve-2014-7169-2", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54162" }, { "title": "Ubuntu Security Notice: bash vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2364-1" }, { "title": "Red Hat: CVE-2014-7186", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-7186" }, { "title": "Amazon Linux AMI: ALAS-2014-419", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-419" }, { "title": "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=86cb6b3955e100fdc9667a7ca916c772" }, { "title": "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=2b57ceaadfde2a8b03482273e1fd21ea" }, { "title": "Apple: OS X Yosemite v10.10.2 and Security Update 2015-001", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=64cbe709a7be49c91d8a8b0f43621640" }, { "title": "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash \u0027Shellshock\u0027 Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-07" }, { "title": "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=64ae0aae8269062686789e3a3fa1d2bf" }, { "title": "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=73443a6db89dc66fc6bcb49f85bfd1ab" }, { "title": "Apple: OS X El Capitan v10.11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=e88bab658248444f5dffc23fd95859e7" }, { "title": "Shell-Shock-Update", "trust": 0.1, "url": "https://github.com/UMDTERPS/Shell-Shock-Update " }, { "title": "exploit-CVE-2014-6271", "trust": 0.1, "url": "https://github.com/opsxcq/exploit-CVE-2014-6271 " }, { "title": "dokku-alt", "trust": 0.1, "url": "https://github.com/dokku-alt/dokku-alt " }, { "title": "Pentest-In-Docker", "trust": 0.1, "url": "https://github.com/Swordfish-Security/Pentest-In-Docker " }, { "title": "fabric-shellshock", "trust": 0.1, "url": "https://github.com/ericlake/fabric-shellshock " }, { "title": "patch-bash-shellshock", "trust": 0.1, "url": "https://github.com/jdauphant/patch-bash-shellshock " }, { "title": "linux-pentest", "trust": 0.1, "url": "https://github.com/ankh2054/linux-pentest " }, { "title": "w-test", "trust": 0.1, "url": "https://github.com/inspirion87/w-test " }, { "title": "shocktrooper", "trust": 0.1, "url": "https://github.com/EvanK/shocktrooper " }, { "title": "ShellShockHunter", "trust": 0.1, "url": "https://github.com/MrCl0wnLab/ShellShockHunter " }, { "title": "shellshockFixOSX", "trust": 0.1, "url": "https://github.com/opragel/shellshockFixOSX " }, { "title": "Xpl-SHELLSHOCK-Ch3ck", "trust": 0.1, "url": "https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck " }, { "title": "bashcheck", "trust": 0.1, "url": "https://github.com/hannob/bashcheck " }, { "title": "shellshocker-pocs", "trust": 0.1, "url": "https://github.com/mubix/shellshocker-pocs " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2014/10/02/vmware_virtually_in_control_of_shellshock/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/vmware-begins-to-patch-bash-issues-across-product-line/108632/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "trust": 2.2, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash" }, { "trust": 2.2, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10085" }, { "trust": 1.9, "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa82" }, { "trust": 1.9, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "trust": 1.6, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2014-1311.html" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2014-1312.html" }, { "trust": 1.4, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "trust": 1.4, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272" }, { "trust": 1.4, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897" }, { "trust": 1.4, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7169" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1354.html" }, { "trust": 1.1, "url": "https://access.redhat.com/articles/1200223" }, { "trust": 1.1, "url": "https://www.suse.com/support/shellshock/" }, { "trust": 1.1, "url": "http://support.novell.com/security/cve/cve-2014-7186.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61479" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61641" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61618" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61622" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61636" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2364-1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61485" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59907" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61654" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html" }, { "trust": 1.1, "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61565" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61643" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61503" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61711" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61633" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61552" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61703" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2014/oct/0" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61283" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61603" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61188" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200217" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60034" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61816" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61128" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61313" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61442" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61287" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200223" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60055" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61129" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61780" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61471" }, { "trust": 1.1, "url": "http://secunia.com/advisories/58200" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61328" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60193" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61065" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61550" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61312" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60063" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61291" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60044" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "trust": 1.1, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityalerts" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60433" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60024" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "trust": 1.1, "url": "http://jvn.jp/en/jp/jvn55667175/index.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "trust": 1.1, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "trust": 1.1, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61873" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62343" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62312" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html" }, { "trust": 1.1, "url": "http://support.apple.com/ht204244" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht205267" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62228" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04518183" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04497075" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6271" }, { "trust": 0.9, "url": "http://www.kb.cert.org/vuls/id/252743" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7186" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/650" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/688" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/685" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 0.8, "url": "https://gist.github.com/anonymous/929d622f3b36b00c0be1" }, { "trust": 0.8, "url": "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html" }, { "trust": 0.8, "url": "https://shellshocker.net/#" }, { "trust": 0.8, "url": "http://support.apple.com/kb/ht6495" }, { "trust": 0.8, "url": "https://www.barracuda.com/support/techalerts" }, { "trust": 0.8, "url": "http://www.checkpoint.com/blog/protecting-shellshock/index.html" }, { "trust": 0.8, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044" }, { "trust": 0.8, "url": "https://www.debian.org/security/2014/dsa-3032" }, { "trust": 0.8, "url": "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf" }, { "trust": 0.8, "url": "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/" }, { "trust": 0.8, "url": "http://www.fortiguard.com/advisory/fg-ir-14-030/" }, { "trust": 0.8, "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml" }, { "trust": 0.8, "url": "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0" }, { "trust": 0.8, "url": "http://kb.juniper.net/jsa10648" }, { "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "trust": 0.8, "url": "http://support.novell.com/security/cve/cve-2014-6271.html" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc.php?id=7015702" }, { "trust": 0.8, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.522193" }, { "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2362-1/" }, { "trust": 0.8, "url": "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us\u0026cmd=displaykc\u0026externalid=2090740" }, { "trust": 0.8, "url": "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2014/at140037.html" }, { "trust": 0.8, "url": "http://jvn.jp/jp/jvn55667175/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96447236/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97219505/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97220341/index.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000126.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7186" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta14-268a" }, { "trust": 0.8, "url": "http://www.aratana.jp/security/detail.php?id=10" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.jp/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 0.7, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6278" }, { "trust": 0.6, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.6, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "http://www.gnu.org/software/bash/" }, { "trust": 0.3, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673" }, { "trust": 0.3, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=kb83017" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2014/q3/735" }, { "trust": 0.3, "url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_c" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss" }, { "trust": 0.3, "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004932" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686433" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=isg3t1021361" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686494" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686445" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004903" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004928" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004911" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686479" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04497075" }, { "trust": 0.3, "url": "http://seclists.org/fulldisclosure/2014/oct/25" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04552143" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10661\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183172" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183066" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183009" }, { "trust": 0.3, "url": "https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00000.html" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paps5" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183222" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479398" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479402" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479492" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475942" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471532" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04488200" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04478866" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04477872" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479536" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692" }, { "trust": 0.3, "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471546" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471538" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04497042" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512907 " }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/76" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04558068" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/77" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533737" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04479974" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487558" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487573" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04496383" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paptm" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paptz" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/1a2e5-5116a33c2fb27/cert_security_mini-_bulletin_xrx15k_for_77xx_r15-03_v1.0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2eeef-51056e459c6d8/cert_security_mini-_bulletin_xrx15h_for_p7800_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2a901-510567b876a35/cert_security_mini-_bulletin_xrx15g_for_p6700_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/1a7a1-50f12e334b734/cert_security_mini-_bulletin_xrx14h_for_wc59xx_v1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2014-1306.html" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-377648.htm" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686447" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004982" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685873" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686132" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096533" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686024" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686037" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686171" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685733" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686098" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685875" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020272" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685541" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004905" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685673" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687971" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685691" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9papw7" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004933" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096503" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004945" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183088" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-7169.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-7186.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-7187.html" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2014-7186" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6277" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6278" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/70152" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35860" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2364-1/" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/36933/" }, { "trust": 0.1, "url": "https://tmc.tippingpoint.com/" }, { "trust": 0.1, "url": "https://www.ca.com" }, { "trust": 0.1, "url": "https://support.ca.com/irj/portal/anonymous/phpsbpldgpg" }, { "trust": 0.1, "url": "https://support.ca.com." }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-1568.html" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/ht" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-6271.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1568" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-7169" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-7187" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-1865.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/km01194258" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "https://my.vertica.com" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7169" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vcenter-log-insight" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2091065" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2090740" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7187" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271" }, { "trust": 0.1, "url": "http://h20272.www2.hp.com/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "BID", "id": "70152" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "PACKETSTORM", "id": "128716" }, { "db": "PACKETSTORM", "id": "128567" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "128537" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "128457" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128760" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7186" }, { "db": "BID", "id": "70152" }, { "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "db": "PACKETSTORM", "id": "128716" }, { "db": "PACKETSTORM", "id": "128567" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "128537" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "128457" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128760" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "db": "NVD", "id": "CVE-2014-7186" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-09-25T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2014-09-28T00:00:00", "db": "VULMON", "id": "CVE-2014-7186" }, { "date": "2014-09-25T00:00:00", "db": "BID", "id": "70152" }, { "date": "2014-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "date": "2014-10-16T13:33:00", "db": "PACKETSTORM", "id": "128716" }, { "date": "2014-10-06T16:47:01", "db": "PACKETSTORM", "id": "128567" }, { "date": "2014-11-12T18:13:39", "db": "PACKETSTORM", "id": "129068" }, { "date": "2014-10-03T00:57:40", "db": "PACKETSTORM", "id": "128537" }, { "date": "2014-10-27T23:44:00", "db": "PACKETSTORM", "id": "128864" }, { "date": "2014-11-17T23:31:07", "db": "PACKETSTORM", "id": "129132" }, { "date": "2014-11-26T15:07:58", "db": "PACKETSTORM", "id": "129264" }, { "date": "2014-10-20T17:55:00", "db": "PACKETSTORM", "id": "128763" }, { "date": "2014-09-27T16:45:52", "db": "PACKETSTORM", "id": "128457" }, { "date": "2014-09-27T16:45:44", "db": "PACKETSTORM", "id": "128456" }, { "date": "2014-12-17T18:27:35", "db": "PACKETSTORM", "id": "129617" }, { "date": "2014-10-01T22:22:00", "db": "PACKETSTORM", "id": "128517" }, { "date": "2014-10-20T17:03:00", "db": "PACKETSTORM", "id": "128760" }, { "date": "2014-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "date": "2014-09-28T19:55:06.223000", "db": "NVD", "id": "CVE-2014-7186" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-14T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2018-10-09T00:00:00", "db": "VULMON", "id": "CVE-2014-7186" }, { "date": "2015-11-03T19:52:00", "db": "BID", "id": "70152" }, { "date": "2015-12-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004432" }, { "date": "2014-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1072" }, { "date": "2024-11-21T02:16:29.170000", "db": "NVD", "id": "CVE-2014-7186" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "128537" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "128457" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "CNNVD", "id": "CNNVD-201409-1072" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GNU Bash shell executes commands in exported functions in environment variables", "sources": [ { "db": "CERT/CC", "id": "VU#252743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201409-1072" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.