Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5621 (GCVE-0-2015-5621)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:59:02.679Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "openSUSE-SU-2015:1502",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"name": "45547",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"name": "RHSA-2015:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"name": "1033304",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033304"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"name": "USN-2711-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"name": "[oss-security] 20150416 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"name": "[oss-security] 20150413 net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.citrix.com/article/CTX209443"
},
{
"name": "DSA-4154",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"name": "[oss-security] 20150731 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"name": "76380",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/76380"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-04-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-11T10:06:22",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "openSUSE-SU-2015:1502",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"name": "45547",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"name": "RHSA-2015:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"name": "1033304",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033304"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"name": "USN-2711-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"name": "[oss-security] 20150416 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"name": "[oss-security] 20150413 net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.citrix.com/article/CTX209443"
},
{
"name": "DSA-4154",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"name": "[oss-security] 20150731 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"name": "76380",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/76380"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1502",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"name": "45547",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"name": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"name": "RHSA-2015:1636",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"name": "1033304",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033304"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"name": "USN-2711-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"name": "[oss-security] 20150416 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"name": "[oss-security] 20150413 net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"name": "http://support.citrix.com/article/CTX209443",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX209443"
},
{
"name": "DSA-4154",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"name": "[oss-security] 20150731 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"name": "https://sourceforge.net/p/net-snmp/bugs/2615/",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"name": "76380",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76380"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-5621",
"datePublished": "2015-08-19T15:00:00",
"dateReserved": "2015-07-22T00:00:00",
"dateUpdated": "2024-08-06T06:59:02.679Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-5621\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-19T15:59:09.460\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en la funci\u00f3n snmp_pdu_parse en snmp_api.c en net-snmp 5.7.2 y versiones anteriores, no elimina la variable varBind en un elemento netsnmp_variable_list cuando falla el an\u00e1lisis gramatical del SNMP PDU, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.7.2\",\"matchCriteriaId\":\"B4A10A0A-6AE1-4771-B5D3-B9D7A1B78476\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1636.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.citrix.com/article/CTX209443\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/13/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/16/15\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/07/31/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/76380\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1033304\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2711-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1212408\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sourceforge.net/p/net-snmp/bugs/2615/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4154\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/45547/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1636.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.citrix.com/article/CTX209443\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/13/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/16/15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/07/31/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/76380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1033304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2711-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1212408\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://sourceforge.net/p/net-snmp/bugs/2615/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/45547/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
rhsa-2015_1636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated net-snmp packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The net-snmp packages provide various libraries and tools for the Simple\nNetwork Management Protocol (SNMP), including an SNMP library, an\nextensible agent, tools for requesting or setting information from SNMP\nagents, tools for generating and handling SNMP traps, a version of the\nnetstat command which uses SNMP, and a Tk/Perl Management Information Base\n(MIB) browser.\n\nIt was discovered that the snmp_pdu_parse() function could leave\nincompletely parsed varBind variables in the list of variables. A remote,\nunauthenticated attacker could use this flaw to crash snmpd or,\npotentially, execute arbitrary code on the system with the privileges of\nthe user running snmpd. (CVE-2015-5621)\n\nRed Hat would like to thank Qinghao Tang of QIHU 360 company, China for\nreporting this issue.\n\nAll net-snmp users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2015:1636",
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1636.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2024-11-22T09:25:11+00:00",
"generator": {
"date": "2024-11-22T09:25:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2015:1636",
"initial_release_date": "2015-08-17T19:32:53+00:00",
"revision_history": [
{
"date": "2015-08-17T19:32:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-08-17T19:32:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T09:25:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product_id": "net-snmp-1:5.5-54.el6_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qinghao Tang"
],
"organization": "QIHU 360"
}
],
"cve": "CVE-2015-5621",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2015-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1212408"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "RHBZ#1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621"
}
],
"release_date": "2015-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables"
},
{
"cve": "CVE-2018-1000116",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552844"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() mishandles error codes and is vulnerable to a heap corruption within the parsing of the PDU prior to the authentication process. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000116"
},
{
"category": "external",
"summary": "RHBZ#1552844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://sourceforge.net/p/net-snmp/bugs/2821/",
"url": "https://sourceforge.net/p/net-snmp/bugs/2821/"
}
],
"release_date": "2018-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c"
}
]
}
rhsa-2015:1636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated net-snmp packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The net-snmp packages provide various libraries and tools for the Simple\nNetwork Management Protocol (SNMP), including an SNMP library, an\nextensible agent, tools for requesting or setting information from SNMP\nagents, tools for generating and handling SNMP traps, a version of the\nnetstat command which uses SNMP, and a Tk/Perl Management Information Base\n(MIB) browser.\n\nIt was discovered that the snmp_pdu_parse() function could leave\nincompletely parsed varBind variables in the list of variables. A remote,\nunauthenticated attacker could use this flaw to crash snmpd or,\npotentially, execute arbitrary code on the system with the privileges of\nthe user running snmpd. (CVE-2015-5621)\n\nRed Hat would like to thank Qinghao Tang of QIHU 360 company, China for\nreporting this issue.\n\nAll net-snmp users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2015:1636",
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1636.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2025-10-09T16:00:13+00:00",
"generator": {
"date": "2025-10-09T16:00:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2015:1636",
"initial_release_date": "2015-08-17T19:32:53+00:00",
"revision_history": [
{
"date": "2015-08-17T19:32:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-08-17T19:32:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T16:00:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product_id": "net-snmp-1:5.5-54.el6_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qinghao Tang"
],
"organization": "QIHU 360"
}
],
"cve": "CVE-2015-5621",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2015-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1212408"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "RHBZ#1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621"
}
],
"release_date": "2015-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables"
},
{
"cve": "CVE-2018-1000116",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552844"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() mishandles error codes and is vulnerable to a heap corruption within the parsing of the PDU prior to the authentication process. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000116"
},
{
"category": "external",
"summary": "RHBZ#1552844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://sourceforge.net/p/net-snmp/bugs/2821/",
"url": "https://sourceforge.net/p/net-snmp/bugs/2821/"
}
],
"release_date": "2018-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c"
}
]
}
RHSA-2015:1636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated net-snmp packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The net-snmp packages provide various libraries and tools for the Simple\nNetwork Management Protocol (SNMP), including an SNMP library, an\nextensible agent, tools for requesting or setting information from SNMP\nagents, tools for generating and handling SNMP traps, a version of the\nnetstat command which uses SNMP, and a Tk/Perl Management Information Base\n(MIB) browser.\n\nIt was discovered that the snmp_pdu_parse() function could leave\nincompletely parsed varBind variables in the list of variables. A remote,\nunauthenticated attacker could use this flaw to crash snmpd or,\npotentially, execute arbitrary code on the system with the privileges of\nthe user running snmpd. (CVE-2015-5621)\n\nRed Hat would like to thank Qinghao Tang of QIHU 360 company, China for\nreporting this issue.\n\nAll net-snmp users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2015:1636",
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1636.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2025-10-09T16:00:13+00:00",
"generator": {
"date": "2025-10-09T16:00:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2015:1636",
"initial_release_date": "2015-08-17T19:32:53+00:00",
"revision_history": [
{
"date": "2015-08-17T19:32:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-08-17T19:32:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T16:00:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_id": "net-snmp-1:5.5-54.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.src",
"product_id": "net-snmp-1:5.5-54.el6_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.el7_1.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_id": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.5-54.el6_7.1?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-sysvinit@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-python@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-gui@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_id": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.7.2-20.ael7b_1.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.src",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.ael7b_1.1.src",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.src",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qinghao Tang"
],
"organization": "QIHU 360"
}
],
"cve": "CVE-2015-5621",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2015-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1212408"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "RHBZ#1212408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621"
}
],
"release_date": "2015-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables"
},
{
"cve": "CVE-2018-1000116",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552844"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the snmp_pdu_parse() mishandles error codes and is vulnerable to a heap corruption within the parsing of the PDU prior to the authentication process. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000116"
},
{
"category": "external",
"summary": "RHBZ#1552844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000116"
},
{
"category": "external",
"summary": "https://sourceforge.net/p/net-snmp/bugs/2821/",
"url": "https://sourceforge.net/p/net-snmp/bugs/2821/"
}
],
"release_date": "2018-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-17T19:32:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Client-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Client-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6ComputeNode-optional-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Server-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Server-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.src",
"6Workstation-6.7.z:net-snmp-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-debuginfo-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-devel-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-libs-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-perl-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-python-1:5.5-54.el6_7.1.x86_64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.i686",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.ppc64",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.s390x",
"6Workstation-6.7.z:net-snmp-utils-1:5.5-54.el6_7.1.x86_64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Client-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Client-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Server-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Server-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-1:5.7.2-20.ael7b_1.1.src",
"7Server-optional-LE-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-devel-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-gui-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-libs-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-perl-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-python-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Server-optional-LE-7.1.Z:net-snmp-utils-1:5.7.2-20.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.src",
"7Workstation-optional-7.1.Z:net-snmp-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-agent-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-debuginfo-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-devel-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-gui-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.i686",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-libs-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-perl-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-python-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-sysvinit-1:5.7.2-20.el7_1.1.x86_64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.ppc64",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.s390x",
"7Workstation-optional-7.1.Z:net-snmp-utils-1:5.7.2-20.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c"
}
]
}
CERTFR-2020-AVI-015
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions 8.5.x antérieures à 8.5.0R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D12 sur séries QFX5100 et EX4600 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à R1912 | ||
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions antérieures à 8.4.1R19 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.4R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur séries MX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur série EX4300 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D52 sur séries QFX3500 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks SBR Carrier versions 8.5.x ant\u00e9rieures \u00e0 8.5.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D12 sur s\u00e9ries QFX5100 et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 R1912",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SBR Carrier versions ant\u00e9rieures \u00e0 8.4.1R19",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.4R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur s\u00e9ries MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur s\u00e9rie EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D52 sur s\u00e9ries QFX3500",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2020-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1611"
},
{
"name": "CVE-2018-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1336"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2018-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5743"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2018-9568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9568"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-11810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11810"
},
{
"name": "CVE-2020-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1606"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1608"
},
{
"name": "CVE-2020-1602",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1602"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-19919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19919"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2020-1601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1601"
},
{
"name": "CVE-2017-2595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2595"
},
{
"name": "CVE-2016-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7061"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2017-12174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12174"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2020-1607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1607"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2020-1604",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1604"
},
{
"name": "CVE-2016-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7055"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2020-1603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1603"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2020-1609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1609"
},
{
"name": "CVE-2020-1605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1605"
},
{
"name": "CVE-2020-1600",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1600"
}
],
"initial_release_date": "2020-01-09T00:00:00",
"last_revision_date": "2020-01-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10992 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10992\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10986 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10986\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10985 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10985\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10980 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10980\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10981 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10981\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10983 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10983\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10979 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10979\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10987 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10987\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10982 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10982\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10990 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10990\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10991 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10991\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10993 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10993\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2024-AVI-0781
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1 | ||
| Juniper Networks | BBE Cloud Setup | BBE Cloudsetup versions antérieures à 2.1.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "BBE Cloudsetup versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "BBE Cloud Setup",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-21618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21618"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-39524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39524"
},
{
"name": "CVE-2020-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15861"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2024-39523",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39523"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2020-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15862"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2019-20892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20892"
},
{
"name": "CVE-2022-4886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4886"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2022-23525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23525"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21605"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2022-23524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23524"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2015-8100",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8100"
},
{
"name": "CVE-2024-21615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21615"
},
{
"name": "CVE-2021-25746",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25746"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2021-25748",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25748"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2022-23526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23526"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2024-21609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21609"
},
{
"name": "CVE-2024-39522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39522"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-39517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39517"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2024-39521",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39521"
},
{
"name": "CVE-2024-39512",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39512"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2021-44225",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44225"
},
{
"name": "CVE-2024-39553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39553"
},
{
"name": "CVE-2024-39520",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39520"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-5043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5043"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2021-25745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25745"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
}
],
"initial_release_date": "2024-09-16T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0781",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-16T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75756",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-low-privileged-user-can-access-confidential-information-CVE-2024-21615"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82975",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-CLI-parameter-processing-issues-allowing-privilege-escalation-resolved"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82977",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-User-is-not-logged-out-when-the-console-cable-is-disconnected-CVE-2024-39512"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82971",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-BBE-Cloudsetup-Multiple-vulnerabilities-resolved-in-2-1-0-release"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79175",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Upon-processing-specific-L2-traffic-rpd-can-hang-in-devices-with-EVPN-VXLAN-configured-CVE-2024-39517"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82974",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL-3-0-12"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75746",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-300-Series-Specific-link-local-traffic-causes-a-control-plane-overload-CVE-2024-21605"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75759",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-LLDP-is-enabled-and-a-malformed-LLDP-packet-is-received-l2cpd-crashes-CVE-2024-21618"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75750",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-If-specific-IPsec-parameters-are-negotiated-iked-will-crash-due-to-a-memory-leak-CVE-2024-21609"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79101",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-arbitrary-data-when-sampling-service-is-enabled-leads-to-partial-Denial-of-Service-DoS-CVE-2024-39553"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82973",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-net-SNMP-5-9-4"
}
]
}
CERTFR-2020-AVI-090
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC IPC427D, IPC427E (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC Route Control V8.1 | ||
| Siemens | N/A | SCALANCE M-800 / S615 versions antérieures à V6.1.2 | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V16 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. variante SIPLUS) | ||
| Siemens | N/A | OpenPCS 7 V9.0 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller versions antérieures à 20.8 | ||
| Siemens | N/A | SIMATIC ET200MP IM155-5 PN ST (incl. variante SIPLUS) versions antérieures à V4.1.0 | ||
| Siemens | N/A | SIMATIC ET200SP IM155-6 PN ST (incl. variante SIPLUS) versions antérieures à V4.1.0 | ||
| Siemens | N/A | SIMATIC Field PG M4, Field PG M5, Field PG M6 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP CPU V7 (incl. variante SIPLUS) | ||
| Siemens | N/A | SIPROTEC 4 et SIPROTEC Compact relays equipped with EN100 Ethernet communication modules | ||
| Siemens | N/A | SIMATIC Route Control V8.2 | ||
| Siemens | N/A | SIPORT MP versions antérieures à V3.1.4 | ||
| Siemens | N/A | SCALANCE X-200IRT switch (incl. variante SIPLUS NET) versions antérieures à V5.4.2 | ||
| Siemens | N/A | OZW672 versions antérieures à V10.00 | ||
| Siemens | N/A | SIMATIC CP 1626 | ||
| Siemens | N/A | SCALANCE X-200 switch (incl. variante SIPLUS NET) versions antérieures à V5.2.4 | ||
| Siemens | N/A | SIMATIC CP 1543-1 (incl. variante SIPLUS NET) versions antérieures V2.2 | ||
| Siemens | N/A | SIMATIC NET PC Software | ||
| Siemens | N/A | RUGGEDCOM RM1224 versions antérieures à V6.1.2 | ||
| Siemens | N/A | SIMATIC WinCC V7.3 | ||
| Siemens | N/A | SIMATIC PCS 7 V8.1 | ||
| Siemens | N/A | SCALANCE X-300 switch (incl. X408 et variante SIPLUS NET) versions antérieures à V4.1.3 | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 | ||
| Siemens | N/A | SCALANCE S602, S612, S623, S627-2M, S627-2M | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P versions antérieures à V4.6 | ||
| Siemens | N/A | SIMATIC BATCH V8.1 | ||
| Siemens | N/A | SIMATIC BATCH V9.0 | ||
| Siemens | N/A | SIMATIC RF182C | ||
| Siemens | N/A | SCALANCE XR-500 switch versions antérieures à V6.2.3 | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V13 versions antérieures à V13 SP2 | ||
| Siemens | N/A | SCALANCE W700 IEEE 802.11n versions antérieures à V6.4 | ||
| Siemens | N/A | SIMOTION P320-4S | ||
| Siemens | N/A | SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. variante SIPLUS NET) | ||
| Siemens | N/A | IE/PB LINK PN IO (incl. variante SIPLUS NET) | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 versions antérieures à V4.5 Patch 01 | ||
| Siemens | N/A | SIMATIC ET200SP IM155-6 PN HF (incl. variante SIPLUS) versions antérieures à V4.2.2 | ||
| Siemens | N/A | SIMATIC S7-300 PN/DP CPU (incl. les CPUS ET200 associées et variantes SIPLUS) | ||
| Siemens | N/A | SIMATIC RF180C | ||
| Siemens | N/A | SIMATIC CP 343-1 Advanced, CP 343-1, CP 343-1 LEAN, CP 443-1 Advanced, CP 443-1 (incl. variante SIPLUS NET) | ||
| Siemens | N/A | SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG versions antérieures à V4.1 | ||
| Siemens | N/A | SIMATIC PCS 7 V8.2 | ||
| Siemens | N/A | TIM 1531 IRC (incl. variante SIPLUS NET) versions antérieures à V2.0 | ||
| Siemens | N/A | SIMATIC CP 343-1 ERPC, CP 443-1 OPC UA | ||
| Siemens | N/A | SIMATIC MV400 | ||
| Siemens | N/A | OZW772 versions antérieures à V10.00 | ||
| Siemens | N/A | SIMATIC IPC Support, Package for VxWorks | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V15.1 | ||
| Siemens | N/A | SINAMICS DCP versions antérieures à V1.3 | ||
| Siemens | N/A | SIMATIC CP 1616 et CP 1604 versions antérieures à V2.8.1 | ||
| Siemens | N/A | SIMATIC ET200pro, IM 154-3 PN HF et ET200pro, IM 154-4 PN HF | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V14.0.1 | ||
| Siemens | N/A | SIMATIC IPC127E, IPC427C, IPC477C, IPC477D, IPC477E, IPC477E Pro, IPC527G, IPC547E, IPC547G, IPC627C, IPC627D, IPC627E, IPC647C, IPC647D, IPC647E, IPC677C, IPC677D, IPC677E, IPC827C, IPC827D, IPC827E, IPC847C, IPC847D, IPC847E | ||
| Siemens | N/A | SIMATIC RF600 versions antérieures à V3.2.1 | ||
| Siemens | N/A | SIMATIC ET200AL IM 157-1 PN, ET200ecoPN (excepté 6ES7148-6JD00-0AB0 et 6ES7146-6FF00-0AB0), ET200M IM153-4 PN IO HF (incl. variante SIPLUS), ET200M IM153-4 PN IO ST (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC ET200MP IM155-5 PN HF (incl. variante SIPLUS) versions antérieures à V4.2.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU (incl. les CPUS ET200 associées et variantes SIPLUS) versions antérieures à 2.8 | ||
| Siemens | N/A | OpenPCS 7 V8.2 | ||
| Siemens | N/A | SIMATIC CP 1628 versions antérieures à V14.00.15.00_51.25.00.01 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à 7.5.1 Upd1 | ||
| Siemens | N/A | SIMATIC CP 1623 versions antérieures à V14.00.15.00_51.25.00.01 | ||
| Siemens | N/A | SIMATIC ITP1000 | ||
| Siemens | N/A | SIMATIC Route Control V9.0 | ||
| Siemens | N/A | SIMATIC ET200S, ET200SP IM155-6 PN Basic (incl. variante SIPLUS) | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | ||
| Siemens | N/A | OpenPCS 7 V8.1 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP CPU V6 et antérieures (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC WinCC V7.4 | ||
| Siemens | N/A | SCALANCE XM-400 switch versions antérieures à V6.2.3 | ||
| Siemens | N/A | PROFINET Driver for Controller versions antérieures à V2.1 Patch 03 | ||
| Siemens | N/A | SIMOTION P320-4E | ||
| Siemens | N/A | SIMATIC BATCH V8.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC IPC427D, IPC427E (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M-800 / S615 versions ant\u00e9rieures \u00e0 V6.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller versions ant\u00e9rieures \u00e0 20.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP IM155-5 PN ST (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP IM155-6 PN ST (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Field PG M4, Field PG M5, Field PG M6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP CPU V7 (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 4 et SIPROTEC Compact relays equipped with EN100 Ethernet communication modules",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPORT MP versions ant\u00e9rieures \u00e0 V3.1.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT switch (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V5.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OZW672 versions ant\u00e9rieures \u00e0 V10.00",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1626",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200 switch (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V5.2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 (incl. variante SIPLUS NET) versions ant\u00e9rieures V2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 versions ant\u00e9rieures \u00e0 V6.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-300 switch (incl. X408 et variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V4.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S602, S612, S623, S627-2M, S627-2M",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P versions ant\u00e9rieures \u00e0 V4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF182C",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR-500 switch versions ant\u00e9rieures \u00e0 V6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V13 versions ant\u00e9rieures \u00e0 V13 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W700 IEEE 802.11n versions ant\u00e9rieures \u00e0 V6.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4S",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IE/PB LINK PN IO (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 versions ant\u00e9rieures \u00e0 V4.5 Patch 01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP IM155-6 PN HF (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 PN/DP CPU (incl. les CPUS ET200 associ\u00e9es et variantes SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF180C",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 343-1 Advanced, CP 343-1, CP 343-1 LEAN, CP 443-1 Advanced, CP 443-1 (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG versions ant\u00e9rieures \u00e0 V4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 343-1 ERPC, CP 443-1 OPC UA",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV400",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OZW772 versions ant\u00e9rieures \u00e0 V10.00",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC Support, Package for VxWorks",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V15.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS DCP versions ant\u00e9rieures \u00e0 V1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1616 et CP 1604 versions ant\u00e9rieures \u00e0 V2.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200pro, IM 154-3 PN HF et ET200pro, IM 154-4 PN HF",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V14.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC127E, IPC427C, IPC477C, IPC477D, IPC477E, IPC477E Pro, IPC527G, IPC547E, IPC547G, IPC627C, IPC627D, IPC627E, IPC647C, IPC647D, IPC647E, IPC677C, IPC677D, IPC677E, IPC827C, IPC827D, IPC827E, IPC847C, IPC847D, IPC847E",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF600 versions ant\u00e9rieures \u00e0 V3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200AL IM 157-1 PN, ET200ecoPN (except\u00e9 6ES7148-6JD00-0AB0 et 6ES7146-6FF00-0AB0), ET200M IM153-4 PN IO HF (incl. variante SIPLUS), ET200M IM153-4 PN IO ST (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP IM155-5 PN HF (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU (incl. les CPUS ET200 associ\u00e9es et variantes SIPLUS) versions ant\u00e9rieures \u00e0 2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1628 versions ant\u00e9rieures \u00e0 V14.00.15.00_51.25.00.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 7.5.1 Upd1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1623 versions ant\u00e9rieures \u00e0 V14.00.15.00_51.25.00.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITP1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200S, ET200SP IM155-6 PN Basic (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP CPU V6 et ant\u00e9rieures (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM-400 switch versions ant\u00e9rieures \u00e0 V6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PROFINET Driver for Controller versions ant\u00e9rieures \u00e0 V2.1 Patch 03",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4E",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-19282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19282"
},
{
"name": "CVE-2019-19277",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19277"
},
{
"name": "CVE-2019-13926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13926"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-19281",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19281"
},
{
"name": "CVE-2019-13941",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13941"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2019-18217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18217"
},
{
"name": "CVE-2019-12815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12815"
},
{
"name": "CVE-2019-13940",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13940"
},
{
"name": "CVE-2019-19279",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19279"
},
{
"name": "CVE-2019-13925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13925"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-6585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6585"
},
{
"name": "CVE-2020-19282",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19282"
},
{
"name": "CVE-2019-13924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13924"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
}
],
"initial_release_date": "2020-02-13T00:00:00",
"last_revision_date": "2020-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-090",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-398519 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-940889 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-974843 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-974843.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-270778 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-270778.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-986695 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-750824 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750824.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-951513 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-951513.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-431678 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-431678.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-591405 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978558 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978558.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
]
}
CERTFR-2016-AVI-133
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Citrix XenServer. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | Citrix XenServer 6.2 SP1 sans le correctif de sécurité XS62ESP1043 | ||
| Citrix | XenServer | Citrix XenServer 6.1 sans le correctif de sécurité XS61E069 | ||
| Citrix | XenServer | Citrix XenServer 6.0.2 sans le correctif de sécurité XS602E054 | ||
| Citrix | XenServer | Citrix XenServer 6.0.2 Common Criteria sans le correctif de sécurité XS602ECC031 | ||
| Citrix | XenServer | Citrix XenServer 6.5 SP1 sans le correctif de sécurité XS65ESP1028 | ||
| Citrix | XenServer | Citrix XenServer 6.0 sans le correctif de sécurité XS60E059 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer 6.2 SP1 sans le correctif de s\u00e9curit\u00e9 XS62ESP1043",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 6.1 sans le correctif de s\u00e9curit\u00e9 XS61E069",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 6.0.2 sans le correctif de s\u00e9curit\u00e9 XS602E054",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 6.0.2 Common Criteria sans le correctif de s\u00e9curit\u00e9 XS602ECC031",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 6.5 SP1 sans le correctif de s\u00e9curit\u00e9 XS65ESP1028",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 6.0 sans le correctif de s\u00e9curit\u00e9 XS60E059",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2016-3158",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3158"
},
{
"name": "CVE-2016-2271",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2271"
},
{
"name": "CVE-2016-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3159"
},
{
"name": "CVE-2016-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3960"
}
],
"initial_release_date": "2016-04-19T00:00:00",
"last_revision_date": "2016-04-19T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-133",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eCitrix XenServer\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX209443 du 18 avril 2016",
"url": "http://support.citrix.com/article/CTX209443"
}
]
}
CERTFR-2022-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Système affecté | Lien vers l'avis éditeur |
|---|---|
| Advantage Navigator Energy & Sustainability | Lien |
| Advantage Navigator Software Proxy V6 | Lien |
| Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
| Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
| Building Twin - 360° Viewer | Lien |
| Capital | Lien |
| Cerberus DMS | Lien |
| CloudConnect 712 | Lien |
| COMOS | Lien |
| COMOS V10.2 | Lien |
| COMOS V10.3 | Lien |
| COMOS V10.4 | Lien |
| cRSP Operator Client Starter | Lien |
| cRSP | Lien |
| Desigo CC | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| E-Car OC Cloud Application | Lien |
| Energy Engage | Lien |
| EnergyIP Prepay V3.7 | Lien |
| EnergyIP Prepay V3.8 | Lien |
| EnergyIP | Lien |
| Enlighted Amaze | Lien |
| Enlighted Where | Lien |
| Geolus Shape Search V10 | Lien |
| Geolus Shape Search V11 | Lien |
| GMA-Manager | Lien |
| HEEDS Connect | Lien |
| HES UDIS | Lien |
| IE/AS-i Link PN IO | Lien |
| IE/PB-Link (incl. SIPLUS NET variants) | Lien |
| IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
| Industrial Edge Hub | Lien |
| Industrial Edge Management App (IEM-App) | Lien |
| Industrial Edge Management OS (IEM-OS) | Lien |
| jROS for Spectrum Power 4 | Lien |
| jROS for Spectrum Power 7 | Lien |
| JT2Go | Lien |
| KTK ATE530S | Lien |
| LOGO! CMR2020 | Lien |
| LOGO! CMR2040 | Lien |
| Mendix Applications | Lien |
| MindSphere App Management Cockpits (Developer& Operator) | Lien |
| MindSphere Asset Manager | Lien |
| Mindsphere Cloud Foundry | Lien |
| Mindsphere Cloud Platform | Lien |
| MindSphere IAM (User Management/ Settings) | Lien |
| MindSphere Integrated Data Lake | Lien |
| MindSphere Notification Service | Lien |
| MindSphere Predictive Learning | Lien |
| MindSphere Usage Transparency Service | Lien |
| MindSphere Visual Explorer | Lien |
| NXpower Monitor | Lien |
| NX | Lien |
| Opcenter EX CP Process Automation Control | Lien |
| Opcenter Execution Core Process Automation Control | Lien |
| Opcenter Intelligence | Lien |
| Operation Scheduler | Lien |
| PROFINET Driver for Controller | Lien |
| PSS(R)CAPE | Lien |
| RFID 181EIP | Lien |
| ROX II | Lien |
| RUGGEDCOM APE1404 Linux | Lien |
| RUGGEDCOM CROSSBOW Station Access Controller | Lien |
| RUGGEDCOM RCM1224 | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM ROX MX5000RE | Lien |
| RUGGEDCOM ROX MX5000 | Lien |
| RUGGEDCOM ROX RX1400 | Lien |
| RUGGEDCOM ROX RX1500 | Lien |
| RUGGEDCOM ROX RX1501 | Lien |
| RUGGEDCOM ROX RX1510 | Lien |
| RUGGEDCOM ROX RX1511 | Lien |
| RUGGEDCOM ROX RX1512 | Lien |
| RUGGEDCOM ROX RX1524 | Lien |
| RUGGEDCOM ROX RX1536 | Lien |
| RUGGEDCOM ROX RX5000 | Lien |
| RUGGEDCOM RX1400 VPE Debian Linux | Lien |
| RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
| SCALANCE LPE9403 | Lien |
| SCALANCE M-800 / S615 | Lien |
| SCALANCE M-800 | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M875 | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W700 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE WAM763-1 | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WLC711 | Lien |
| SCALANCE WLC712 | Lien |
| SCALANCE WUM763-1 | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2 | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X206-1LD | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208 | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X302-7 EEC (230V coated) | Lien |
| SCALANCE X302-7 EEC (230V) | Lien |
| SCALANCE X302-7 EEC (24V coated) | Lien |
| SCALANCE X302-7 EEC (24V) | Lien |
| SCALANCE X302-7 EEC (2x 230V coated) | Lien |
| SCALANCE X302-7 EEC (2x 230V) | Lien |
| SCALANCE X302-7 EEC (2x 24V coated) | Lien |
| SCALANCE X302-7 EEC (2x 24V) | Lien |
| SCALANCE X302-7EEC | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X306-1LD FE | Lien |
| SCALANCE X306-1LDFE | Lien |
| SCALANCE X307-2 EEC (230V coated) | Lien |
| SCALANCE X307-2 EEC (230V) | Lien |
| SCALANCE X307-2 EEC (24V coated) | Lien |
| SCALANCE X307-2 EEC (24V) | Lien |
| SCALANCE X307-2 EEC (2x 230V coated) | Lien |
| SCALANCE X307-2 EEC (2x 230V) | Lien |
| SCALANCE X307-2 EEC (2x 24V coated) | Lien |
| SCALANCE X307-2 EEC (2x 24V) | Lien |
| SCALANCE X307-2EEC | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2 | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X320-1-2LD FE | Lien |
| SCALANCE X320-1 FE | Lien |
| SCALANCE X320-1FE | Lien |
| SCALANCE X320-3LDFE | Lien |
| SCALANCE X408-2 | Lien |
| SCALANCE X408 | Lien |
| SCALANCE X414 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE XF204-2 | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XM-400 Family | Lien |
| SCALANCE XM400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR324-12M (230V ports on front) | Lien |
| SCALANCE XR324-12M (230V ports on rear) | Lien |
| SCALANCE XR324-12M (24V ports on front) | Lien |
| SCALANCE XR324-12M (24V ports on rear) | Lien |
| SCALANCE XR324-12M | Lien |
| SCALANCE XR324-12M TS (24V) | Lien |
| SCALANCE XR324-12M TS | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC (24V ports on front) | Lien |
| SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC | Lien |
| SCALANCE XR324-4M PoE | Lien |
| SCALANCE XR324-4M PoE TS | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR500 | Lien |
| SCALANCE XR-500 | Lien |
| SENTRON 3VA COM100/800 | Lien |
| SENTRON 3VA DSP800 | Lien |
| SENTRON PAC2200 (with CLP Approval) | Lien |
| SENTRON PAC2200 (with MID Approval) | Lien |
| SENTRON PAC2200 (without MID Approval) | Lien |
| SENTRON PAC3200 | Lien |
| SENTRON PAC3200T | Lien |
| SENTRON PAC3220 | Lien |
| SENTRON PAC4200 | Lien |
| SENTRON powermanager V4 | Lien |
| SICAM 230 | Lien |
| SICAM TOOLBOX II | Lien |
| SIDOOR ATD430W | Lien |
| SIDOOR ATE530S COATED | Lien |
| SIDOOR ATE531S | Lien |
| SIGUARD DSA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC Cloud Connect 7 CC712 | Lien |
| SIMATIC Cloud Connect 7 CC716 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542SP-1 | Lien |
| SIMATIC Compact Field Unit | Lien |
| SIMATIC CP 1242-7C | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1616 and CP 1604 | Lien |
| SIMATIC CP1616/CP1604 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP1626 | Lien |
| SIMATIC CP 1626 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 ERPC | Lien |
| SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean | Lien |
| SIMATIC CP 343-1 | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC DK-16xx PN IO | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC ET200AL IM 157-1 PN | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200pro IM 154-3 PN HF | Lien |
| SIMATIC ET200pro IM 154-4 PN HF | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 MF HF | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC Field PG M5 | Lien |
| SIMATIC Field PG M6 | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC IE/PB-LINK V3 | Lien |
| SIMATIC Information Server | Lien |
| SIMATIC IPC1047E | Lien |
| SIMATIC IPC1047 | Lien |
| SIMATIC IPC127E | Lien |
| SIMATIC IPC427E | Lien |
| SIMATIC IPC477E Pro | Lien |
| SIMATIC IPC477E | Lien |
| SIMATIC IPC527G | Lien |
| SIMATIC IPC547G | Lien |
| SIMATIC IPC627E | Lien |
| SIMATIC IPC647D | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC677E | Lien |
| SIMATIC IPC847D | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC Support Package for VxWorks | Lien |
| SIMATIC ITC1500 PRO | Lien |
| SIMATIC ITC1500 | Lien |
| SIMATIC ITC1900 PRO | Lien |
| SIMATIC ITC1900 | Lien |
| SIMATIC ITC2200 PRO | Lien |
| SIMATIC ITC2200 | Lien |
| SIMATIC ITP1000 | Lien |
| SIMATIC Logon | Lien |
| SIMATIC MICRO-DRIVE PDC | Lien |
| SIMATIC MV400 family | Lien |
| SIMATIC MV400 | Lien |
| SIMATIC MV540 H (6GF3540-0GE10) | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 S (6GF3540-0CD10) | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV550 H (6GF3550-0GE10) | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 S (6GF3550-0CD10) | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV560 U (6GF3560-0LE10) | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 X (6GF3560-0HE10) | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC NET CP 1604 | Lien |
| SIMATIC NET CP 1616 | Lien |
| SIMATIC NET DK-16xx PN IO | Lien |
| SIMATIC NET PC Software | Lien |
| SIMATIC PCS 7 TeleControl | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PDM | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC Power Line Booster PLB Base Module | Lien |
| SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC RF166C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF360R | Lien |
| SIMATIC RF600 family | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600 | Lien |
| SIMATIC RF650R | Lien |
| SIMATIC RF680R | Lien |
| SIMATIC RF685R | Lien |
| SIMATIC RTU3010C | Lien |
| SIMATIC RTU3030C | Lien |
| SIMATIC RTU3031C | Lien |
| SIMATIC RTU3041C | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 Software Controller (incl. F) | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinCC OA | Lien |
| SIMATIC WinCC OA V3.17 | Lien |
| SIMATIC WinCC OA V3.18 | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC TeleControl | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.5 | Lien |
| SIMATIC WinCC V7.5 | Lien |
| Simcenter 3D | Lien |
| Simcenter Amesim | Lien |
| Simcenter Femap V2020.2 | Lien |
| Simcenter Femap V2021.1 | Lien |
| Simcenter System Architect | Lien |
| Simcenter System Simulation Client for Git | Lien |
| Simcenter Testlab Data Management | Lien |
| Simcenter Testlab | Lien |
| SIMIT Simulation Platform | Lien |
| SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
| SIMOCODE proV Ethernet/IP | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE proV PROFINET | Lien |
| SIMOTION C | Lien |
| SIMOTION C | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION P | Lien |
| SIMOTION P V4.4 and V4.5 | Lien |
| SIMOTION P V5 | Lien |
| SINAMICS Connect 300 | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS G110M V4.7 Control Unit | Lien |
| SINAMICS G110M V4.7 PN Control Unit | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G130 V4.6 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 SP1 Control Unit | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.8 Control Unit | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V5.1 Control Unit | Lien |
| SINAMICS G130 V5.1 SP1 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 V4.6 Control Unit | Lien |
| SINAMICS G150 V4.7 Control Unit | Lien |
| SINAMICS G150 V4.7 SP1 Control Unit | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.8 Control Unit | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V5.1 Control Unit | Lien |
| SINAMICS G150 V5.1 SP1 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 V4.6 Control Unit | Lien |
| SINAMICS S150 V4.7 Control Unit | Lien |
| SINAMICS S150 V4.7 SP1 Control Unit | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.8 Control Unit | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V5.1 Control Unit | Lien |
| SINAMICS S150 V5.1 SP1 Control Unit | Lien |
| SINAMICS S210 V5.1 Control Unit | Lien |
| SINAMICS S210 V5.1 SP1 Control Unit | Lien |
| SINAMICS S/G Control Unit w. PROFINET | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS V90 w. PN | Lien |
| SINAMICS V90 w. PN | Lien |
| SINEC INS | Lien |
| SINEC NMS | Lien |
| SINEC-NMS | Lien |
| SINEC NMS | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server V14 | Lien |
| SINUMERIK 808D | Lien |
| SINUMERIK 828D HW PU.4 | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D V4.5 and prior | Lien |
| SINUMERIK 828D V4.7 | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl V4.5 and prior | Lien |
| SINUMERIK 840D sl V4.7 | Lien |
| SINUMERIK MC MCU 1720 | Lien |
| SINUMERIK ONE NCU 1740 | Lien |
| SINUMERIK ONE PPU 1740 | Lien |
| SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK Operate | Lien |
| SiPass integrated V2.80 | Lien |
| SiPass integrated V2.85 | Lien |
| SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Lean | Lien |
| SIPLUS NET CP 343-1 | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIRIUS ACT 3SU1 interface module PROFINET | Lien |
| SIRIUS Motor Starter M200D PROFINET | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SITOP Manager | Lien |
| SITOP PSU8600 PROFINET | Lien |
| SITOP PSU8600 | Lien |
| SITOP UPS1600 (incl. SIPLUS variants) | Lien |
| SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
| Siveillance Command | Lien |
| Siveillance Control Pro | Lien |
| Siveillance Identity V1.5 | Lien |
| Siveillance Identity V1.6 | Lien |
| Siveillance Vantage | Lien |
| SOFTNET-IE PNIO | Lien |
| SOFTNET-IE PNIO | Lien |
| Softnet PROFINET IO for PC-based Windows systems | Lien |
| Solid Edge CAM Pro | Lien |
| Solid Edge Harness Design | Lien |
| Solid Edge SE2021 | Lien |
| Solid Edge SE2022 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 7 | Lien |
| SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
| Teamcenter Active Workspace | Lien |
| Teamcenter Briefcase Browser | Lien |
| Teamcenter Data Share Manager | Lien |
| Teamcenter Deployment Center | Lien |
| Teamcenter Dispatcher Service | Lien |
| Teamcenter EDA | Lien |
| Teamcenter FMS | Lien |
| Teamcenter Integration for CATIA | Lien |
| Teamcenter Integration Framework | Lien |
| Teamcenter MBSE Gateway | Lien |
| Teamcenter Mendix Connector | Lien |
| Teamcenter Microservices Framework | Lien |
| Teamcenter Polarion Integration | Lien |
| Teamcenter Rapid Start | Lien |
| Teamcenter Reporting and Analytics V11 | Lien |
| Teamcenter Reporting and Analytics V12.2 | Lien |
| Teamcenter Reporting and Analytics V12.3 | Lien |
| Teamcenter Reporting and Analytics V12.4 | Lien |
| Teamcenter Reporting and Analytics V13 | Lien |
| Teamcenter Retail Footwear and Apparel | Lien |
| Teamcenter Security Services | Lien |
| Teamcenter Supplier Collaboration | Lien |
| Teamcenter System Modeling Workbench | Lien |
| Teamcenter | Lien |
| Teamcenter Technical Publishing | Lien |
| Teamcenter Visualization V12.4 | Lien |
| Teamcenter Visualization V13.1 | Lien |
| Teamcenter Visualization V13.2 | Lien |
| Teamcenter Visualization V13.3 | Lien |
| Tecnomatix eBOP Manager Server | Lien |
| Tecnomatix Intosite | Lien |
| Tecnomatix Plant Simulation | Lien |
| Tecnomatix Process Designer | Lien |
| Tecnomatix Process Simulate | Lien |
| Tecnomatix Process Simulate VCLite | Lien |
| Tecnomatix RobotExpert | Lien |
| TeleControl Server Basic | Lien |
| TIA Administrator | Lien |
| TIA Administrator | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC | Lien |
| TIM 1531 IRC | Lien |
| TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
| Valor Parts Library - VPL Direct | Lien |
| Valor Parts Library - VPL Server or Service | Lien |
| VeSys | Lien |
| Xpedition Enterprise VX.2.10 | Lien |
| Xpedition Enterprise VX.2.6 | Lien |
| Xpedition Enterprise VX.2.7 | Lien |
| Xpedition Enterprise VX.2.8 | Lien |
| Xpedition Enterprise (XCR) VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.6 | Lien |
| Xpedition IC Packaging VX.2.7 | Lien |
| Xpedition IC Packaging VX.2.8 | Lien |
| Xpedition IC Packaging (XCR) VX.2.10 | Lien |
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40360"
},
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2021-37186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37186"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37198"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40363"
},
{
"name": "CVE-2021-46151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46151"
},
{
"name": "CVE-2021-44018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44018"
},
{
"name": "CVE-2022-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23312"
},
{
"name": "CVE-2021-41990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41990"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2021-46161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46161"
},
{
"name": "CVE-2021-41991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41991"
},
{
"name": "CVE-2021-46160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46160"
},
{
"name": "CVE-2022-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23102"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13933"
},
{
"name": "CVE-2019-8460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8460"
},
{
"name": "CVE-2019-6575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6575"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2019-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6568"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46156"
},
{
"name": "CVE-2021-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37197"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2021-37194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37194"
},
{
"name": "CVE-2021-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46153"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2021-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46152"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-37185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37185"
},
{
"name": "CVE-2021-46154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46154"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-37195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37195"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-46159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46159"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2021-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40358"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-44000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44000"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38405"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-46155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46155"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2021-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37196"
},
{
"name": "CVE-2021-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40364"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-37204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37204"
},
{
"name": "CVE-2019-19300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19300"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10942"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2017-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2681"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46158"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2021-46157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46157"
},
{
"name": "CVE-2021-45106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45106"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17437"
},
{
"name": "CVE-2021-44016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44016"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40359"
},
{
"name": "CVE-2021-37205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37205"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2019-19301",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19301"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-02-09T00:00:00",
"last_revision_date": "2022-02-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
}
]
}
fkie_cve-2015-5621
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html | ||
| cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-1636.html | ||
| cve@mitre.org | http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/ | ||
| cve@mitre.org | http://support.citrix.com/article/CTX209443 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/04/13/1 | Exploit | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/04/16/15 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/07/31/1 | ||
| cve@mitre.org | http://www.securityfocus.com/bid/76380 | ||
| cve@mitre.org | http://www.securitytracker.com/id/1033304 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2711-1 | ||
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1212408 | ||
| cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf | ||
| cve@mitre.org | https://sourceforge.net/p/net-snmp/bugs/2615/ | ||
| cve@mitre.org | https://www.debian.org/security/2018/dsa-4154 | ||
| cve@mitre.org | https://www.exploit-db.com/exploits/45547/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1636.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.citrix.com/article/CTX209443 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/04/13/1 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/04/16/15 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/07/31/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76380 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033304 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2711-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1212408 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceforge.net/p/net-snmp/bugs/2615/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4154 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/45547/ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A10A0A-6AE1-4771-B5D3-B9D7A1B78476",
"versionEndIncluding": "5.7.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet."
},
{
"lang": "es",
"value": "Vulnerabilidad en la funci\u00f3n snmp_pdu_parse en snmp_api.c en net-snmp 5.7.2 y versiones anteriores, no elimina la variable varBind en un elemento netsnmp_variable_list cuando falla el an\u00e1lisis gramatical del SNMP PDU, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado."
}
],
"id": "CVE-2015-5621",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-19T15:59:09.460",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"source": "cve@mitre.org",
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"source": "cve@mitre.org",
"url": "http://support.citrix.com/article/CTX209443"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/76380"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1033304"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"source": "cve@mitre.org",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
},
{
"source": "cve@mitre.org",
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"source": "cve@mitre.org",
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.citrix.com/article/CTX209443"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/76380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/45547/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-19"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2015-05637
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://bugzilla.redhat.com/show_bug.cgi?id=1212408
| Name | ['Red Hat Enterprise Linux Desktop 6', 'Oracle Enterprise Linux 6', 'Oracle Enterprise Linux 6.2', 'Ubuntu Ubuntu Linux 12.04 LTS amd64', 'Ubuntu Ubuntu Linux 12.04 LTS i386', 'Net-SNMP Net-SNMP 0', 'Red Hat Enterprise Linux Workstation 6', 'Red Hat Enterprise Linux Server 6', 'Red Hat Enterprise Linux HPC Node 6', 'CentOS CentOS 6'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "76380"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-5621"
}
},
"description": "Net-SNMP\u662f\u4e00\u5957\u5f00\u6e90\u7684\u7b80\u5355\u7f51\u7edc\u7ba1\u7406\u534f\u8bae\u3002 \r\n\r\nNet-SNMP\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u5728\u5e94\u7528\u7a0b\u5e8f\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "Qinghao Tang of QIHU 360 company",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1212408",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-05637",
"openTime": "2015-08-27",
"patchDescription": "Net-SNMP\u662f\u4e00\u5957\u5f00\u6e90\u7684\u7b80\u5355\u7f51\u7edc\u7ba1\u7406\u534f\u8bae\u3002Net-SNMP\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u5728\u5e94\u7528\u7a0b\u5e8f\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Net-SNMP\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Red Hat Enterprise Linux Desktop 6",
"Oracle Enterprise Linux 6",
"Oracle Enterprise Linux 6.2",
"Ubuntu Ubuntu Linux 12.04 LTS amd64",
"Ubuntu Ubuntu Linux 12.04 LTS i386",
"Net-SNMP Net-SNMP 0",
"Red Hat Enterprise Linux Workstation 6",
"Red Hat Enterprise Linux Server 6",
"Red Hat Enterprise Linux HPC Node 6",
"CentOS CentOS 6"
]
},
"referenceLink": "http://www.securityfocus.com/bid/76380",
"serverity": "\u9ad8",
"submitTime": "2015-08-19",
"title": "Net-SNMP\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
suse-su-2015:1524-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for net-snmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "net-snmp was updated to fix one security vulnerability and several bugs.\n\n- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) \n- Add build requirement \u0027procps\u0027 to fix a net-snmp-config error. (bsc#935863)\n- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).\n- stop snmptrapd on package removal.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp3-net-snmp-12079,sdksp4-net-snmp-12079,sledsp3-net-snmp-12079,sledsp4-net-snmp-12079,slessp3-net-snmp-12079,slessp4-net-snmp-12079",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1524-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:1524-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151524-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:1524-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html"
},
{
"category": "self",
"summary": "SUSE Bug 853382",
"url": "https://bugzilla.suse.com/853382"
},
{
"category": "self",
"summary": "SUSE Bug 935863",
"url": "https://bugzilla.suse.com/935863"
},
{
"category": "self",
"summary": "SUSE Bug 940188",
"url": "https://bugzilla.suse.com/940188"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5621 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5621/"
}
],
"title": "Security update for net-snmp",
"tracking": {
"current_release_date": "2015-08-17T09:48:10Z",
"generator": {
"date": "2015-08-17T09:48:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:1524-1",
"initial_release_date": "2015-08-17T09:48:10Z",
"revision_history": [
{
"date": "2015-08-17T09:48:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"product": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"product_id": "net-snmp-devel-5.4.2.1-8.12.24.1.i586"
}
},
{
"category": "product_version",
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"product": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"product_id": "libsnmp15-5.4.2.1-8.12.24.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-5.4.2.1-8.12.24.1.i586",
"product": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586",
"product_id": "net-snmp-5.4.2.1-8.12.24.1.i586"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"product": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"product_id": "perl-SNMP-5.4.2.1-8.12.24.1.i586"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"product": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"product_id": "snmp-mibs-5.4.2.1-8.12.24.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"product_id": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64"
}
},
{
"category": "product_version",
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"product_id": "libsnmp15-5.4.2.1-8.12.24.1.ia64"
}
},
{
"category": "product_version",
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"product_id": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"product_id": "net-snmp-5.4.2.1-8.12.24.1.ia64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"product_id": "perl-SNMP-5.4.2.1-8.12.24.1.ia64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"product": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"product_id": "snmp-mibs-5.4.2.1-8.12.24.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"product_id": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"product_id": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"product_id": "libsnmp15-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"product_id": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"product_id": "net-snmp-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"product_id": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"product": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"product_id": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"product_id": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"product_id": "libsnmp15-5.4.2.1-8.12.24.1.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"product_id": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"product_id": "net-snmp-5.4.2.1-8.12.24.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"product_id": "perl-SNMP-5.4.2.1-8.12.24.1.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"product": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"product_id": "snmp-mibs-5.4.2.1-8.12.24.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"product_id": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"product_id": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"product_id": "libsnmp15-5.4.2.1-8.12.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"product_id": "net-snmp-5.4.2.1-8.12.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"product_id": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"product": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"product_id": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sled:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sled:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4",
"product_id": "SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "net-snmp-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64"
},
"product_reference": "snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5621"
}
],
"notes": [
{
"category": "general",
"text": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5621",
"url": "https://www.suse.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "SUSE Bug 1111123 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/1111123"
},
{
"category": "external",
"summary": "SUSE Bug 940188 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/940188"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Desktop 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libsnmp15-x86-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:net-snmp-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-SNMP-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:snmp-mibs-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libsnmp15-32bit-5.4.2.1-8.12.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-32bit-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:net-snmp-devel-5.4.2.1-8.12.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-08-17T09:48:10Z",
"details": "important"
}
],
"title": "CVE-2015-5621"
}
]
}
suse-su-2015:1556-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for net-snmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe following issues have been fixed within this update:\n\n* fix btrfs output inside HOST-RESOURCES-MIB::hrStorageDescr.\n (bsc#909479)\n* fix an incompletely initialized vulnerability within the\n snmp_pdu_parse() function of snmp_api.c. (bsc#940188, CVE-2015-5621)\n* add build requirement \u0027procps\u0027 to fix a net-snmp-config error\n (bsc#935863)\n* --disable-md5 to allow operation in FIPS mode and not use the\n old algorithm (bsc#935876 bsc#940084)\n* also stop snmptrapd on removal\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-2015-537,SUSE-SLE-SDK-12-2015-537,SUSE-SLE-SERVER-12-2015-537",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1556-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:1556-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151556-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:1556-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html"
},
{
"category": "self",
"summary": "SUSE Bug 909479",
"url": "https://bugzilla.suse.com/909479"
},
{
"category": "self",
"summary": "SUSE Bug 935863",
"url": "https://bugzilla.suse.com/935863"
},
{
"category": "self",
"summary": "SUSE Bug 935876",
"url": "https://bugzilla.suse.com/935876"
},
{
"category": "self",
"summary": "SUSE Bug 940084",
"url": "https://bugzilla.suse.com/940084"
},
{
"category": "self",
"summary": "SUSE Bug 940188",
"url": "https://bugzilla.suse.com/940188"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5621 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5621/"
}
],
"title": "Security update for net-snmp",
"tracking": {
"current_release_date": "2015-08-21T13:10:58Z",
"generator": {
"date": "2015-08-21T13:10:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:1556-1",
"initial_release_date": "2015-08-21T13:10:58Z",
"revision_history": [
{
"date": "2015-08-21T13:10:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.7.2.1-4.3.2.ppc64le",
"product": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.ppc64le",
"product_id": "net-snmp-devel-5.7.2.1-4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsnmp30-5.7.2.1-4.3.2.ppc64le",
"product": {
"name": "libsnmp30-5.7.2.1-4.3.2.ppc64le",
"product_id": "libsnmp30-5.7.2.1-4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.2.1-4.3.2.ppc64le",
"product": {
"name": "net-snmp-5.7.2.1-4.3.2.ppc64le",
"product_id": "net-snmp-5.7.2.1-4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"product": {
"name": "perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"product_id": "perl-SNMP-5.7.2.1-4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"product": {
"name": "snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"product_id": "snmp-mibs-5.7.2.1-4.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-devel-5.7.2.1-4.3.2.s390x",
"product": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.s390x",
"product_id": "net-snmp-devel-5.7.2.1-4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp30-5.7.2.1-4.3.2.s390x",
"product": {
"name": "libsnmp30-5.7.2.1-4.3.2.s390x",
"product_id": "libsnmp30-5.7.2.1-4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"product": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"product_id": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.2.1-4.3.2.s390x",
"product": {
"name": "net-snmp-5.7.2.1-4.3.2.s390x",
"product_id": "net-snmp-5.7.2.1-4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.2.1-4.3.2.s390x",
"product": {
"name": "perl-SNMP-5.7.2.1-4.3.2.s390x",
"product_id": "perl-SNMP-5.7.2.1-4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.2.1-4.3.2.s390x",
"product": {
"name": "snmp-mibs-5.7.2.1-4.3.2.s390x",
"product_id": "snmp-mibs-5.7.2.1-4.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "libsnmp30-5.7.2.1-4.3.2.x86_64",
"product_id": "libsnmp30-5.7.2.1-4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"product_id": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "net-snmp-5.7.2.1-4.3.2.x86_64",
"product_id": "net-snmp-5.7.2.1-4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "perl-SNMP-5.7.2.1-4.3.2.x86_64",
"product_id": "perl-SNMP-5.7.2.1-4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "snmp-mibs-5.7.2.1-4.3.2.x86_64",
"product_id": "snmp-mibs-5.7.2.1-4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.7.2.1-4.3.2.x86_64",
"product": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.x86_64",
"product_id": "net-snmp-devel-5.7.2.1-4.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12",
"product": {
"name": "SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12",
"product": {
"name": "SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:libsnmp30-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:net-snmp-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:perl-SNMP-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:snmp-mibs-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "net-snmp-devel-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.s390x"
},
"product_reference": "net-snmp-devel-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "net-snmp-devel-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.s390x"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x"
},
"product_reference": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.s390x"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.s390x"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.s390x"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.s390x"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x"
},
"product_reference": "libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.s390x"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "net-snmp-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.s390x"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "perl-SNMP-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.s390x"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.2.1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.x86_64"
},
"product_reference": "snmp-mibs-5.7.2.1-4.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5621"
}
],
"notes": [
{
"category": "general",
"text": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5621",
"url": "https://www.suse.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "SUSE Bug 1111123 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/1111123"
},
{
"category": "external",
"summary": "SUSE Bug 940188 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/940188"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Desktop 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-32bit-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:libsnmp30-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:net-snmp-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:perl-SNMP-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:snmp-mibs-5.7.2.1-4.3.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:net-snmp-devel-5.7.2.1-4.3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-08-21T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2015-5621"
}
]
}
opensuse-su-2024:10204-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsnmp30-32bit-5.7.3-8.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsnmp30-32bit-5.7.3-8.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10204",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10204-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-2141 page",
"url": "https://www.suse.com/security/cve/CVE-2012-2141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2284 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2285 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5621 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5621/"
}
],
"title": "libsnmp30-32bit-5.7.3-8.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10204-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.7.3-8.4.aarch64",
"product": {
"name": "libsnmp30-5.7.3-8.4.aarch64",
"product_id": "libsnmp30-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.3-8.4.aarch64",
"product": {
"name": "libsnmp30-32bit-5.7.3-8.4.aarch64",
"product_id": "libsnmp30-32bit-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.3-8.4.aarch64",
"product": {
"name": "net-snmp-5.7.3-8.4.aarch64",
"product_id": "net-snmp-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.7.3-8.4.aarch64",
"product": {
"name": "net-snmp-devel-5.7.3-8.4.aarch64",
"product_id": "net-snmp-devel-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"product": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"product_id": "net-snmp-devel-32bit-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-python-5.7.3-8.4.aarch64",
"product": {
"name": "net-snmp-python-5.7.3-8.4.aarch64",
"product_id": "net-snmp-python-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.3-8.4.aarch64",
"product": {
"name": "perl-SNMP-5.7.3-8.4.aarch64",
"product_id": "perl-SNMP-5.7.3-8.4.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.3-8.4.aarch64",
"product": {
"name": "snmp-mibs-5.7.3-8.4.aarch64",
"product_id": "snmp-mibs-5.7.3-8.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.7.3-8.4.ppc64le",
"product": {
"name": "libsnmp30-5.7.3-8.4.ppc64le",
"product_id": "libsnmp30-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.3-8.4.ppc64le",
"product": {
"name": "libsnmp30-32bit-5.7.3-8.4.ppc64le",
"product_id": "libsnmp30-32bit-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.3-8.4.ppc64le",
"product": {
"name": "net-snmp-5.7.3-8.4.ppc64le",
"product_id": "net-snmp-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.7.3-8.4.ppc64le",
"product": {
"name": "net-snmp-devel-5.7.3-8.4.ppc64le",
"product_id": "net-snmp-devel-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"product": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"product_id": "net-snmp-devel-32bit-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-python-5.7.3-8.4.ppc64le",
"product": {
"name": "net-snmp-python-5.7.3-8.4.ppc64le",
"product_id": "net-snmp-python-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.3-8.4.ppc64le",
"product": {
"name": "perl-SNMP-5.7.3-8.4.ppc64le",
"product_id": "perl-SNMP-5.7.3-8.4.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.3-8.4.ppc64le",
"product": {
"name": "snmp-mibs-5.7.3-8.4.ppc64le",
"product_id": "snmp-mibs-5.7.3-8.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.7.3-8.4.s390x",
"product": {
"name": "libsnmp30-5.7.3-8.4.s390x",
"product_id": "libsnmp30-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.3-8.4.s390x",
"product": {
"name": "libsnmp30-32bit-5.7.3-8.4.s390x",
"product_id": "libsnmp30-32bit-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.3-8.4.s390x",
"product": {
"name": "net-snmp-5.7.3-8.4.s390x",
"product_id": "net-snmp-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.7.3-8.4.s390x",
"product": {
"name": "net-snmp-devel-5.7.3-8.4.s390x",
"product_id": "net-snmp-devel-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.7.3-8.4.s390x",
"product": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.s390x",
"product_id": "net-snmp-devel-32bit-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-python-5.7.3-8.4.s390x",
"product": {
"name": "net-snmp-python-5.7.3-8.4.s390x",
"product_id": "net-snmp-python-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.3-8.4.s390x",
"product": {
"name": "perl-SNMP-5.7.3-8.4.s390x",
"product_id": "perl-SNMP-5.7.3-8.4.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.3-8.4.s390x",
"product": {
"name": "snmp-mibs-5.7.3-8.4.s390x",
"product_id": "snmp-mibs-5.7.3-8.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.7.3-8.4.x86_64",
"product": {
"name": "libsnmp30-5.7.3-8.4.x86_64",
"product_id": "libsnmp30-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.7.3-8.4.x86_64",
"product": {
"name": "libsnmp30-32bit-5.7.3-8.4.x86_64",
"product_id": "libsnmp30-32bit-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.7.3-8.4.x86_64",
"product": {
"name": "net-snmp-5.7.3-8.4.x86_64",
"product_id": "net-snmp-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.7.3-8.4.x86_64",
"product": {
"name": "net-snmp-devel-5.7.3-8.4.x86_64",
"product_id": "net-snmp-devel-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"product_id": "net-snmp-devel-32bit-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-python-5.7.3-8.4.x86_64",
"product": {
"name": "net-snmp-python-5.7.3-8.4.x86_64",
"product_id": "net-snmp-python-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.7.3-8.4.x86_64",
"product": {
"name": "perl-SNMP-5.7.3-8.4.x86_64",
"product_id": "perl-SNMP-5.7.3-8.4.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.7.3-8.4.x86_64",
"product": {
"name": "snmp-mibs-5.7.3-8.4.x86_64",
"product_id": "snmp-mibs-5.7.3-8.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64"
},
"product_reference": "libsnmp30-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le"
},
"product_reference": "libsnmp30-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x"
},
"product_reference": "libsnmp30-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64"
},
"product_reference": "libsnmp30-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64"
},
"product_reference": "libsnmp30-32bit-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le"
},
"product_reference": "libsnmp30-32bit-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x"
},
"product_reference": "libsnmp30-32bit-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64"
},
"product_reference": "libsnmp30-32bit-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64"
},
"product_reference": "net-snmp-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le"
},
"product_reference": "net-snmp-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x"
},
"product_reference": "net-snmp-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64"
},
"product_reference": "net-snmp-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64"
},
"product_reference": "net-snmp-devel-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le"
},
"product_reference": "net-snmp-devel-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x"
},
"product_reference": "net-snmp-devel-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64"
},
"product_reference": "net-snmp-devel-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64"
},
"product_reference": "net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le"
},
"product_reference": "net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x"
},
"product_reference": "net-snmp-devel-32bit-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64"
},
"product_reference": "net-snmp-python-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le"
},
"product_reference": "net-snmp-python-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x"
},
"product_reference": "net-snmp-python-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-python-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64"
},
"product_reference": "net-snmp-python-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64"
},
"product_reference": "perl-SNMP-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le"
},
"product_reference": "perl-SNMP-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x"
},
"product_reference": "perl-SNMP-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64"
},
"product_reference": "perl-SNMP-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.3-8.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64"
},
"product_reference": "snmp-mibs-5.7.3-8.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.3-8.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le"
},
"product_reference": "snmp-mibs-5.7.3-8.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.3-8.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x"
},
"product_reference": "snmp-mibs-5.7.3-8.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.7.3-8.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
},
"product_reference": "snmp-mibs-5.7.3-8.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-2141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-2141"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-2141",
"url": "https://www.suse.com/security/cve/CVE-2012-2141"
},
{
"category": "external",
"summary": "SUSE Bug 759352 for CVE-2012-2141",
"url": "https://bugzilla.suse.com/759352"
},
{
"category": "external",
"summary": "SUSE Bug 826684 for CVE-2012-2141",
"url": "https://bugzilla.suse.com/826684"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-2141"
},
{
"cve": "CVE-2014-2284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2284"
}
],
"notes": [
{
"category": "general",
"text": "The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2284",
"url": "https://www.suse.com/security/cve/CVE-2014-2284"
},
{
"category": "external",
"summary": "SUSE Bug 866942 for CVE-2014-2284",
"url": "https://bugzilla.suse.com/866942"
},
{
"category": "external",
"summary": "SUSE Bug 875217 for CVE-2014-2284",
"url": "https://bugzilla.suse.com/875217"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2014-2284",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2284"
},
{
"cve": "CVE-2014-2285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2285"
}
],
"notes": [
{
"category": "general",
"text": "The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2285",
"url": "https://www.suse.com/security/cve/CVE-2014-2285"
},
{
"category": "external",
"summary": "SUSE Bug 866942 for CVE-2014-2285",
"url": "https://bugzilla.suse.com/866942"
},
{
"category": "external",
"summary": "SUSE Bug 875217 for CVE-2014-2285",
"url": "https://bugzilla.suse.com/875217"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2014-2285",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3565"
}
],
"notes": [
{
"category": "general",
"text": "snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3565",
"url": "https://www.suse.com/security/cve/CVE-2014-3565"
},
{
"category": "external",
"summary": "SUSE Bug 894361 for CVE-2014-3565",
"url": "https://bugzilla.suse.com/894361"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2014-3565",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2015-5621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5621"
}
],
"notes": [
{
"category": "general",
"text": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5621",
"url": "https://www.suse.com/security/cve/CVE-2015-5621"
},
{
"category": "external",
"summary": "SUSE Bug 1111123 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/1111123"
},
{
"category": "external",
"summary": "SUSE Bug 940188 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/940188"
},
{
"category": "external",
"summary": "SUSE Bug 969779 for CVE-2015-5621",
"url": "https://bugzilla.suse.com/969779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:libsnmp30-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:net-snmp-python-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.7.3-8.4.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.7.3-8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-5621"
}
]
}
WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
ICSA-20-042-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Several industrial products are affected by a vulnerability that could allow remote attackers to conduct a denial of service attack by sending specially crafted packets to port 161/udp (SNMP).\n\nSiemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-978220.json"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-978220.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-042-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-042-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-042-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Industrial Products SNMP (Update F)",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-042-02",
"initial_release_date": "2020-02-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-02-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-07-14T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added solution for IE/PB LINK PN IO"
},
{
"date": "2020-08-11T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Informed about successor products for the SCALANCE S-600 family"
},
{
"date": "2021-02-09T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added solution for SIMATIC NET CP 1626"
},
{
"date": "2021-04-13T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added solution for SCALANCE S602, SCALANCE S612, SCALANCE S623, and SCALANCE S627-2M"
},
{
"date": "2022-02-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "No remediation planned for SIMATIC CP 443-1 OPC UA, SIMATIC CP 343-1 Advanced, SIPLUS NET CP 343-1 Advanced"
},
{
"date": "2022-04-12T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Updated remediation for SIMATIC CP 1623"
},
{
"date": "2022-06-14T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "No fix planned for SIMATIC CP 343-1 Advanced"
},
{
"date": "2023-04-11T00:00:00.000000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC CP 443-1 and CP 443-1 Advanced"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "10",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0.1",
"product": {
"name": "IE/PB link PN IO (6GK1411-5AB10)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK1411-5AB10"
]
}
}
}
],
"category": "product_name",
"name": "IE/PB link PN IO (6GK1411-5AB10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S602",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S612",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S623",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S627-2M",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1623 (6GK1162-3AA00)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK1162-3AA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1623 (6GK1162-3AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1.1",
"product": {
"name": "SIMATIC CP 1626 (6GK1162-6AA01)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK1162-6AA01"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1626 (6GK1162-6AA01)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1628 (6GK1162-8AA00)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK1162-8AA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1628 (6GK1162-8AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK7343-1GX31-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE0)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1EX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE1)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1EX30-0XE1"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1GX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1UX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6AG1343-1GX31-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6AG1443-1EX30-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6AG1443-1GX30-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0.1",
"product": {
"name": "SIPLUS NET IE/PB link PN IO (6AG1411-5AB10-2AA0)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6AG1411-5AB10-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET IE/PB link PN IO (6AG1411-5AB10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1MX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1MX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5621",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An error in the message handling of SNMP messages allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted packet sent on port 161/udp (SNMP).\r\n\r\nThe security vulnerability could be exploited by an attacker with network access to the affected device.\r\nSuccessful exploitation requires no system privileges and no user interaction.\r\nAn attacker could use the vulnerability to compromise availability of the affected system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable SNMP if supported by the product; disabling SNMP fully mitigates the vulnerability",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Protect network access to port 161/udp of affected devices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Use VPN for protecting network communication between cells",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Migrate to a successor product within the SCALANCE SC-600 family, V2.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109780500) or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.3 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0015",
"CSAFPID-0016"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1\nUpdate is only available via Siemens Support contact",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "vendor_fix",
"details": "The updated firmware is contained in SIMATIC NET PC Software V14 Update 14 or later version or SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V1.1.1 or later version",
"product_ids": [
"CSAFPID-0007"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109792924/"
},
{
"category": "vendor_fix",
"details": "Update to SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0008"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109774204/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0017"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109780330/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
],
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2018-18065",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL Pointer Exception bug within the SMNP handling code allows authenticated attacker to remotely\r\ncause a denial of service via a crafted packet sent on port 161/udp (SNMP).\r\n\r\nThe security vulnerability could be exploited by an attacker with network access to the affected device.\r\nSuccessful exploitation requires no system privileges and no user interaction.\r\nAn attacker could use the vulnerability to compromise availability of the affected system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable SNMP if supported by the product; disabling SNMP fully mitigates the vulnerability",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Protect network access to port 161/udp of affected devices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Use VPN for protecting network communication between cells",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Migrate to a successor product within the SCALANCE SC-600 family, V2.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109780500) or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.3 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0015",
"CSAFPID-0016"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1\nUpdate is only available via Siemens Support contact",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "vendor_fix",
"details": "The updated firmware is contained in SIMATIC NET PC Software V14 Update 14 or later version or SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V1.1.1 or later version",
"product_ids": [
"CSAFPID-0007"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109792924/"
},
{
"category": "vendor_fix",
"details": "Update to SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0008"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109774204/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0017"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109780330/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
],
"title": "CVE-2018-18065"
}
]
}
icsa-20-042-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Several industrial products are affected by a vulnerability that could allow remote attackers to conduct a denial of service attack by sending specially crafted packets to port 161/udp (SNMP).\n\nSiemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-978220.json"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
},
{
"category": "self",
"summary": "SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-978220.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-042-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-042-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-042-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Industrial Products SNMP (Update F)",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-042-02",
"initial_release_date": "2020-02-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-02-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-07-14T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added solution for IE/PB LINK PN IO"
},
{
"date": "2020-08-11T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Informed about successor products for the SCALANCE S-600 family"
},
{
"date": "2021-02-09T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added solution for SIMATIC NET CP 1626"
},
{
"date": "2021-04-13T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added solution for SCALANCE S602, SCALANCE S612, SCALANCE S623, and SCALANCE S627-2M"
},
{
"date": "2022-02-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "No remediation planned for SIMATIC CP 443-1 OPC UA, SIMATIC CP 343-1 Advanced, SIPLUS NET CP 343-1 Advanced"
},
{
"date": "2022-04-12T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Updated remediation for SIMATIC CP 1623"
},
{
"date": "2022-06-14T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "No fix planned for SIMATIC CP 343-1 Advanced"
},
{
"date": "2023-04-11T00:00:00.000000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC CP 443-1 and CP 443-1 Advanced"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "10",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0.1",
"product": {
"name": "IE/PB link PN IO (6GK1411-5AB10)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK1411-5AB10"
]
}
}
}
],
"category": "product_name",
"name": "IE/PB link PN IO (6GK1411-5AB10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S602",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S612",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S623",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1",
"product": {
"name": "SCALANCE S627-2M",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1623 (6GK1162-3AA00)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK1162-3AA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1623 (6GK1162-3AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1.1",
"product": {
"name": "SIMATIC CP 1626 (6GK1162-6AA01)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK1162-6AA01"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1626 (6GK1162-6AA01)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1628 (6GK1162-8AA00)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK1162-8AA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1628 (6GK1162-8AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK7343-1GX31-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE0)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1EX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE1)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1EX30-0XE1"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (6GK7443-1EX30-0XE1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1GX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK7443-1UX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6AG1343-1GX31-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6AG1443-1EX30-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3",
"product": {
"name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6AG1443-1GX30-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0.1",
"product": {
"name": "SIPLUS NET IE/PB link PN IO (6AG1411-5AB10-2AA0)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6AG1411-5AB10-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET IE/PB link PN IO (6AG1411-5AB10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1MX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1MX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5621",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An error in the message handling of SNMP messages allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted packet sent on port 161/udp (SNMP).\r\n\r\nThe security vulnerability could be exploited by an attacker with network access to the affected device.\r\nSuccessful exploitation requires no system privileges and no user interaction.\r\nAn attacker could use the vulnerability to compromise availability of the affected system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable SNMP if supported by the product; disabling SNMP fully mitigates the vulnerability",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Protect network access to port 161/udp of affected devices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Use VPN for protecting network communication between cells",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Migrate to a successor product within the SCALANCE SC-600 family, V2.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109780500) or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.3 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0015",
"CSAFPID-0016"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1\nUpdate is only available via Siemens Support contact",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "vendor_fix",
"details": "The updated firmware is contained in SIMATIC NET PC Software V14 Update 14 or later version or SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V1.1.1 or later version",
"product_ids": [
"CSAFPID-0007"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109792924/"
},
{
"category": "vendor_fix",
"details": "Update to SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0008"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109774204/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0017"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109780330/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
],
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2018-18065",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL Pointer Exception bug within the SMNP handling code allows authenticated attacker to remotely\r\ncause a denial of service via a crafted packet sent on port 161/udp (SNMP).\r\n\r\nThe security vulnerability could be exploited by an attacker with network access to the affected device.\r\nSuccessful exploitation requires no system privileges and no user interaction.\r\nAn attacker could use the vulnerability to compromise availability of the affected system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable SNMP if supported by the product; disabling SNMP fully mitigates the vulnerability",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Protect network access to port 161/udp of affected devices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Use VPN for protecting network communication between cells",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
{
"category": "mitigation",
"details": "Migrate to a successor product within the SCALANCE SC-600 family, V2.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109780500) or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.3 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0015",
"CSAFPID-0016"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1\nUpdate is only available via Siemens Support contact",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "vendor_fix",
"details": "The updated firmware is contained in SIMATIC NET PC Software V14 Update 14 or later version or SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V1.1.1 or later version",
"product_ids": [
"CSAFPID-0007"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109792924/"
},
{
"category": "vendor_fix",
"details": "Update to SIMATIC NET PC Software V16 or later version",
"product_ids": [
"CSAFPID-0008"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109775589/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109774204/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0017"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109780330/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
],
"title": "CVE-2018-18065"
}
]
}
ghsa-w7cc-jv4p-qccr
Vulnerability from github
The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
{
"affected": [],
"aliases": [
"CVE-2015-5621"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-08-19T15:59:00Z",
"severity": "HIGH"
},
"details": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"id": "GHSA-w7cc-jv4p-qccr",
"modified": "2025-04-12T12:51:09Z",
"published": "2022-05-14T02:45:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5621"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
},
{
"type": "WEB",
"url": "https://sourceforge.net/p/net-snmp/bugs/2615"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/45547"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"type": "WEB",
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791"
},
{
"type": "WEB",
"url": "http://support.citrix.com/article/CTX209443"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/76380"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1033304"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2711-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
gsd-2015-5621
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2015-5621",
"description": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"id": "GSD-2015-5621",
"references": [
"https://www.suse.com/security/cve/CVE-2015-5621.html",
"https://www.debian.org/security/2018/dsa-4154",
"https://access.redhat.com/errata/RHSA-2015:1636",
"https://ubuntu.com/security/CVE-2015-5621",
"https://security.archlinux.org/CVE-2015-5621",
"https://alas.aws.amazon.com/cve/html/CVE-2015-5621.html",
"https://linux.oracle.com/cve/CVE-2015-5621.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-5621"
],
"details": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.",
"id": "GSD-2015-5621",
"modified": "2023-12-13T01:20:06.511404Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1502",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"name": "45547",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"name": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"name": "RHSA-2015:1636",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"name": "1033304",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033304"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"name": "USN-2711-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"name": "[oss-security] 20150416 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"name": "[oss-security] 20150413 net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"name": "http://support.citrix.com/article/CTX209443",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX209443"
},
{
"name": "DSA-4154",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"name": "[oss-security] 20150731 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"name": "https://sourceforge.net/p/net-snmp/bugs/2615/",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"name": "76380",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76380"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.7.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5621"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-19"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20150413 net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/13/1"
},
{
"name": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"
},
{
"name": "[oss-security] 20150731 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2015/07/31/1"
},
{
"name": "USN-2711-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2711-1"
},
{
"name": "https://sourceforge.net/p/net-snmp/bugs/2615/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://sourceforge.net/p/net-snmp/bugs/2615/"
},
{
"name": "RHSA-2015:1636",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1636.html"
},
{
"name": "[oss-security] 20150416 Re: net-snmp snmp_pdu_parse() function incompletely initializaition vulnerability",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2015/04/16/15"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212408"
},
{
"name": "76380",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/76380"
},
{
"name": "http://support.citrix.com/article/CTX209443",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.citrix.com/article/CTX209443"
},
{
"name": "openSUSE-SU-2015:1502",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"
},
{
"name": "1033304",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1033304"
},
{
"name": "DSA-4154",
"refsource": "DEBIAN",
"tags": [],
"url": "https://www.debian.org/security/2018/dsa-4154"
},
{
"name": "45547",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/45547/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-10T10:29Z",
"publishedDate": "2015-08-19T15:59Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.