Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-7187
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7187.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61857" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7187", "datePublished": "2014-09-28T19:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-7187\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-28T19:55:06.270\",\"lastModified\":\"2024-11-21T02:16:29.490\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \\\"word_lineno\\\" issue.\"},{\"lang\":\"es\",\"value\":\"Error de superaci\u00f3n de l\u00edmite (off-by-one) en la funci\u00f3n read_token_word en parse.y en GNU Bash hasta 4.3 bash43-026 permite a atacantes remotos causar una denegaci\u00f3n de servicio (acceso a array fuera de rango y ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otro impacto no especificado a trav\u00e9s de profundamente anidados para bucles, tambi\u00e9n conocido como el problema \u0027word_lineno\u0027.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4B4BB-C5A0-4283-9657-FC61BC95C014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972BDA0A-25C8-4C02-8624-07D2462C214C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A6E8C3-334D-443B-8AD6-F8A131490F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B631B7E-C59D-444F-80CE-DC2345A56E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C8E637-AD10-4854-AD60-A908D017DDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AB7456-89E4-4F40-82D0-EED52CAEE670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE919509-57B0-4D13-9503-943D5BFED620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F027515-A126-4899-B78E-121C8312002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC05A483-FAFD-4C40-85BC-D2EE907B2B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"097C61C9-4761-4D8F-9590-376FC1A5522B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA81069-36E0-4035-B31F-A5281E10C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC216C39-2EA0-4B58-87EA-81A737E5D2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88731DFF-B0B1-4325-A662-287D5E6E7265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA313D8-2B28-4C73-A96B-7814C37F0725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43630818-4A62-4766-AADC-AB87BE1C5553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"202B9DB4-80DC-4D1C-8DA8-C06E89FF542A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CB667F-26C8-46FA-81CE-1F6909AC006D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755984AB-D061-45F0-8845-D7B78BA506E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7187.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7187.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-8m22-gm6f-5487
Vulnerability from github
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
{ "affected": [], "aliases": [ "CVE-2014-7187" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-09-28T19:55:00Z", "severity": "HIGH" }, "details": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", "id": "GHSA-8m22-gm6f-5487", "modified": "2022-05-14T02:51:13Z", "published": "2022-05-14T02:51:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" }, { "type": "WEB", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "type": "WEB", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "type": "WEB", "url": "https://support.apple.com/HT205267" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX200217" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX200223" }, { "type": "WEB", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "type": "WEB", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "type": "WEB", "url": "https://www.suse.com/support/shellshock" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "type": "WEB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "type": "WEB", "url": "http://secunia.com/advisories/58200" }, { "type": "WEB", "url": "http://secunia.com/advisories/59907" }, { "type": "WEB", "url": "http://secunia.com/advisories/60024" }, { "type": "WEB", "url": "http://secunia.com/advisories/60034" }, { "type": "WEB", "url": "http://secunia.com/advisories/60044" }, { "type": "WEB", "url": "http://secunia.com/advisories/60055" }, { "type": "WEB", "url": "http://secunia.com/advisories/60063" }, { "type": "WEB", "url": "http://secunia.com/advisories/60193" }, { "type": "WEB", "url": "http://secunia.com/advisories/60433" }, { "type": "WEB", "url": "http://secunia.com/advisories/61065" }, { "type": "WEB", "url": "http://secunia.com/advisories/61128" }, { "type": "WEB", "url": "http://secunia.com/advisories/61129" }, { "type": "WEB", "url": "http://secunia.com/advisories/61188" }, { "type": "WEB", "url": "http://secunia.com/advisories/61283" }, { "type": "WEB", "url": "http://secunia.com/advisories/61287" }, { "type": "WEB", "url": "http://secunia.com/advisories/61291" }, { "type": "WEB", "url": "http://secunia.com/advisories/61312" }, { "type": "WEB", "url": "http://secunia.com/advisories/61313" }, { "type": "WEB", "url": "http://secunia.com/advisories/61328" }, { "type": "WEB", "url": "http://secunia.com/advisories/61442" }, { "type": "WEB", "url": "http://secunia.com/advisories/61479" }, { "type": "WEB", "url": "http://secunia.com/advisories/61485" }, { "type": "WEB", "url": "http://secunia.com/advisories/61503" }, { "type": "WEB", "url": "http://secunia.com/advisories/61550" }, { "type": "WEB", "url": "http://secunia.com/advisories/61552" }, { "type": "WEB", "url": "http://secunia.com/advisories/61565" }, { "type": "WEB", "url": "http://secunia.com/advisories/61603" }, { "type": "WEB", "url": "http://secunia.com/advisories/61618" }, { "type": "WEB", "url": "http://secunia.com/advisories/61622" }, { "type": "WEB", "url": "http://secunia.com/advisories/61633" }, { "type": "WEB", "url": "http://secunia.com/advisories/61636" }, { "type": "WEB", "url": "http://secunia.com/advisories/61641" }, { "type": "WEB", "url": "http://secunia.com/advisories/61643" }, { "type": "WEB", "url": "http://secunia.com/advisories/61654" }, { "type": "WEB", "url": "http://secunia.com/advisories/61703" }, { "type": "WEB", "url": "http://secunia.com/advisories/61816" }, { "type": "WEB", "url": "http://secunia.com/advisories/61855" }, { "type": "WEB", "url": "http://secunia.com/advisories/61857" }, { "type": "WEB", "url": "http://secunia.com/advisories/61873" }, { "type": "WEB", "url": "http://secunia.com/advisories/62312" }, { "type": "WEB", "url": "http://secunia.com/advisories/62343" }, { "type": "WEB", "url": "http://support.apple.com/HT204244" }, { "type": "WEB", "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "type": "WEB", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2014_1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5.9 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1865", "url": "https://access.redhat.com/errata/RHSA-2014:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1865.json" } ], "title": "Red Hat Security Advisory: bash Shift_JIS security update", "tracking": { "current_release_date": "2024-11-14T16:27:19+00:00", "generator": { "date": "2024-11-14T16:27:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1865", "initial_release_date": "2014-11-17T18:11:13+00:00", "revision_history": [ { "date": "2014-11-17T18:11:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-11-17T18:11:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:27:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "SJIS (v. 5.9.z Server)", "product": { "name": "SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:5" } } } ], "category": "product_family", "name": "RHEL S-JIS Service" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product_id": "bash-0:3.2-32.el5_9.3.sjis.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.i386", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.ia64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.src as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.src", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64" }, "product_reference": "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "relates_to_product_reference": "5Server-SJIS-5.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", "product_id": "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", "relates_to_product_reference": "5Server-SJIS-5.9.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T18:11:13+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1311
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1311", "url": "https://access.redhat.com/errata/RHSA-2014:1311" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1311.json" } ], "title": "Red Hat Security Advisory: bash security update", "tracking": { "current_release_date": "2024-11-14T16:26:16+00:00", "generator": { "date": "2024-11-14T16:26:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1311", "initial_release_date": "2014-09-26T17:58:08+00:00", "revision_history": [ { "date": "2014-09-26T17:58:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T15:08:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:5.6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.9" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.src", "product": { "name": "bash-0:4.1.2-15.el6_4.2.src", "product_id": "bash-0:4.1.2-15.el6_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:4.1.2-9.el6_2.2.src", "product": { "name": "bash-0:4.1.2-9.el6_2.2.src", "product_id": "bash-0:4.1.2-9.el6_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.src", "product": { "name": "bash-0:3.2-24.el5_6.2.src", "product_id": "bash-0:3.2-24.el5_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.src", "product": { "name": "bash-0:3.2-32.el5_9.3.src", "product_id": "bash-0:3.2-32.el5_9.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.src", "product": { "name": "bash-0:3.0-27.el4.4.src", "product_id": "bash-0:3.0-27.el4.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.s390x", "product": { "name": "bash-0:4.1.2-15.el6_4.2.s390x", "product_id": "bash-0:4.1.2-15.el6_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.s390x", "product": { "name": "bash-0:3.2-32.el5_9.3.s390x", "product_id": "bash-0:3.2-32.el5_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=i686" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_4.2.i686", "product_id": "bash-0:4.1.2-15.el6_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-9.el6_2.2.x86_64", "product": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64", "product_id": "bash-0:4.1.2-9.el6_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.x86_64", "product": { "name": "bash-0:3.2-24.el5_6.2.x86_64", "product_id": "bash-0:3.2-24.el5_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.x86_64", "product": { "name": "bash-0:3.2-32.el5_9.3.x86_64", "product_id": "bash-0:3.2-32.el5_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product_id": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.x86_64", "product": { "name": "bash-0:3.0-27.el4.4.x86_64", "product_id": "bash-0:3.0-27.el4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_4.2.ppc64", "product": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64", "product_id": "bash-0:4.1.2-15.el6_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.ia64", "product": { "name": "bash-0:3.2-24.el5_6.2.ia64", "product_id": "bash-0:3.2-24.el5_6.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.ia64", "product": { "name": "bash-0:3.2-32.el5_9.3.ia64", "product_id": "bash-0:3.2-32.el5_9.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ia64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product_id": "bash-debuginfo-0:3.0-27.el4.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.ia64", "product": { "name": "bash-0:3.0-27.el4.4.ia64", "product_id": "bash-0:3.0-27.el4.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-0:3.2-24.el5_6.2.i386", "product": { "name": "bash-0:3.2-24.el5_6.2.i386", "product_id": "bash-0:3.2-24.el5_6.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product_id": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.i386", "product": { "name": "bash-0:3.2-32.el5_9.3.i386", "product_id": "bash-0:3.2-32.el5_9.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=i386" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.0-27.el4.4.i386", "product": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386", "product_id": "bash-debuginfo-0:3.0-27.el4.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.0-27.el4.4.i386", "product": { "name": "bash-0:3.0-27.el4.4.i386", "product_id": "bash-0:3.0-27.el4.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product_id": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ppc" } } }, { "category": "product_version", "name": "bash-0:3.2-32.el5_9.3.ppc", "product": { "name": "bash-0:3.2-32.el5_9.3.ppc", "product_id": "bash-0:3.2-32.el5_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.i386" }, "product_reference": "bash-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.src" }, "product_reference": "bash-0:3.0-27.el4.4.src", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.i386" }, "product_reference": "bash-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.src" }, "product_reference": "bash-0:3.0-27.el4.4.src", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.0-27.el4.4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386" }, "product_reference": "bash-0:3.2-24.el5_6.2.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64" }, "product_reference": "bash-0:3.2-24.el5_6.2.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src" }, "product_reference": "bash-0:3.2-24.el5_6.2.src", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64" }, "product_reference": "bash-0:3.2-24.el5_6.2.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386" }, "product_reference": "bash-0:3.2-32.el5_9.3.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64" }, "product_reference": "bash-0:3.2-32.el5_9.3.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc" }, "product_reference": "bash-0:3.2-32.el5_9.3.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x" }, "product_reference": "bash-0:3.2-32.el5_9.3.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src" }, "product_reference": "bash-0:3.2-32.el5_9.3.src", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64" }, "product_reference": "bash-0:3.2-32.el5_9.3.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.src", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.src", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-9.el6_2.2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.src", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_4.2.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T17:58:08+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1311" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1354
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1354", "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-12-15T18:38:44+00:00", "generator": { "date": "2024-12-15T18:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2014:1354", "initial_release_date": "2014-10-02T18:40:05+00:00", "revision_history": [ { "date": "2014-10-02T18:40:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-02T18:40:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-M 3.4", "product": { "name": "RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:3" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-S-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "relates_to_product_reference": "6Server-RHEV-S-3.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1568", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2014-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1145429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1568" }, { "category": "external", "summary": "RHBZ#1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1568", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)" }, { "cve": "CVE-2014-6271", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2014-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1141597" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: specially-crafted environment variables can be used to inject shell commands", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6271" }, { "category": "external", "summary": "RHBZ#1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "bash: specially-crafted environment variables can be used to inject shell commands" }, { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1306
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1306", "url": "https://access.redhat.com/errata/RHSA-2014:1306" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1306.json" } ], "title": "Red Hat Security Advisory: bash security update", "tracking": { "current_release_date": "2024-11-14T16:26:09+00:00", "generator": { "date": "2024-11-14T16:26:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1306", "initial_release_date": "2014-09-26T01:46:36+00:00", "revision_history": [ { "date": "2014-09-26T01:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T16:02:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.src", "product": { "name": "bash-0:4.1.2-15.el6_5.2.src", "product_id": "bash-0:4.1.2-15.el6_5.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.src", "product": { "name": "bash-0:4.2.45-5.el7_0.4.src", "product_id": "bash-0:4.2.45-5.el7_0.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.src", "product": { "name": "bash-0:3.2-33.el5_11.4.src", "product_id": "bash-0:3.2-33.el5_11.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=i686" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_5.2.i686", "product_id": "bash-0:4.1.2-15.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.x86_64", "product": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64", "product_id": "bash-0:4.2.45-5.el7_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.x86_64", "product": { "name": "bash-0:3.2-33.el5_11.4.x86_64", "product_id": "bash-0:3.2-33.el5_11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.s390x", "product": { "name": "bash-0:4.1.2-15.el6_5.2.s390x", "product_id": "bash-0:4.1.2-15.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.s390x", "product": { "name": "bash-0:4.2.45-5.el7_0.4.s390x", "product_id": "bash-0:4.2.45-5.el7_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=s390x" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.s390x", "product": { "name": "bash-0:3.2-33.el5_11.4.s390x", "product_id": "bash-0:3.2-33.el5_11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.2.ppc64", "product": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64", "product_id": "bash-0:4.1.2-15.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=ppc64" } } }, { "category": "product_version", "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=ppc64" } } }, { "category": "product_version", "name": "bash-0:4.2.45-5.el7_0.4.ppc64", "product": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64", "product_id": "bash-0:4.2.45-5.el7_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.i386", "product": { "name": "bash-0:3.2-33.el5_11.4.i386", "product_id": "bash-0:3.2-33.el5_11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.ia64", "product": { "name": "bash-0:3.2-33.el5_11.4.ia64", "product_id": "bash-0:3.2-33.el5_11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product_id": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ppc" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.4.ppc", "product": { "name": "bash-0:3.2-33.el5_11.4.ppc", "product_id": "bash-0:3.2-33.el5_11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src" }, "product_reference": "bash-0:3.2-33.el5_11.4.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src" }, "product_reference": "bash-0:3.2-33.el5_11.4.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" }, "product_reference": "bash-doc-0:4.2.45-5.el7_0.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T01:46:36+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
rhsa-2014_1312
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1312", "url": "https://access.redhat.com/errata/RHSA-2014:1312" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1312.json" } ], "title": "Red Hat Security Advisory: bash Shift_JIS security update", "tracking": { "current_release_date": "2024-11-14T16:26:22+00:00", "generator": { "date": "2024-11-14T16:26:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2014:1312", "initial_release_date": "2014-09-26T21:28:16+00:00", "revision_history": [ { "date": "2014-09-26T21:28:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-30T15:08:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T16:26:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "S-JIS for Red Hat Enteprise Linux 6 Server", "product": { "name": "S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:6" } } }, { "category": "product_name", "name": "S-JIS for Red Hat Enteprise Linux 5 Server", "product": { "name": "S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_sjis:5" } } } ], "category": "product_family", "name": "RHEL S-JIS Service" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=x86_64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product_id": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=src" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=ia64" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=i386" } } }, { "category": "product_version", "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product_id": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.i386", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.ia64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.src", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64" }, "product_reference": "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", "product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64" }, "product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "relates_to_product_reference": "5Server-SJIS-5.11.z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.src", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "relates_to_product_reference": "6Server-SJIS-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", "product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" }, "product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "relates_to_product_reference": "6Server-SJIS-6.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-26T21:28:16+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1312" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
CVE-2014-7187
Vulnerability from jvndb
▼ | Vendor | Product |
---|---|---|
QNAP Systems | QNAP QTS |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "dc:date": "2015-12-25T13:47+09:00", "dcterms:issued": "2014-10-28T14:39+09:00", "dcterms:modified": "2015-12-25T13:47+09:00", "description": "QNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability (CWE-78).\r\n\r\nYuuki Wakisaka of University of Electro-Communications reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "sec:cpe": { "#text": "cpe:/o:qnap:qts", "@product": "QNAP QTS", "@vendor": "QNAP Systems", "@version": "2.2" }, "sec:cvss": { "@score": "10.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000126", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN55667175/index.html", "@id": "JVN#55667175", "@source": "JVN" }, { "#text": "https://jvn.jp/vu/JVNVU97219505/index.html", "@id": "JVNVU#97219505", "@source": "JVN" }, { "#text": "http://jvn.jp/vu/JVNVU97220341/index.html", "@id": "JVNVU#97220341", "@source": "JVN" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004399.html", "@id": "JVNDB-2014-004399", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004410.html", "@id": "JVNDB-2014-004410", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004431.html", "@id": "JVNDB-2014-004431", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004476.html", "@id": "JVNDB-2014-004476", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004432.html", "@id": "JVNDB-2014-004432", "@source": "JVN iPedia" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004433.html", "@id": "JVNDB-2014-004433", "@source": "JVN iPedia" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "NVD" }, { "#text": "http://www.kb.cert.org/vuls/id/252743", "@id": "VU#252743", "@source": "CERT-VN" }, { "#text": "https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01", "@id": "ICSA-15-344-01", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a", "@id": "ICSA-14-269-01A", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "QNAP QTS vulnerable to OS command injection" }
var-201409-1148
Vulnerability from variot
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. GNU Bash 3.2 and later are vulnerable; prior versions may also be affected.
HP StoreEver ESL E-series Tape Library
- Disable DHCP and only use static IP addressing.
HP Virtual Library System (VLS)
- Disable DHCP and only use static IP addressing.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script.
Open the PXE Configuration Utility on the HP Insight Control server deployment window Select Linux Managed from the Boot Menu options Click the Edit button. Clicking the Edit button displays the Edit Shared Menu Option window Uncheck the x86 option in Operating System and Processor Options and click OK. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: bash security update Advisory ID: RHSA-2014:1311-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html Issue date: 2014-09-26 CVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 =====================================================================
- Summary:
Updated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat Enterprise Linux 6.4 Extended Update Support.
Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AS (v. 4 ELS) - i386, ia64, x86_64 Red Hat Enterprise Linux AUS (v. 6.2 server) - x86_64 Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64 Red Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64
- Description:
The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux.
It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169)
Applications which directly create Bash functions as environment variables need to be made aware of the changes to the way names are handled by this update. For more information see the Knowledgebase article at https://access.redhat.com/articles/1200223
Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes.
For additional information on CVE-2014-6271 and CVE-2014-7169, refer to the aforementioned Knowledgebase article.
All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)
- Package List:
Red Hat Enterprise Linux AS (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
ia64: bash-3.0-27.el4.4.i386.rpm bash-3.0-27.el4.4.ia64.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.ia64.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux ES (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux LL (v. 5.6 server):
Source: bash-3.2-24.el5_6.2.src.rpm
i386: bash-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm
ia64: bash-3.2-24.el5_6.2.i386.rpm bash-3.2-24.el5_6.2.ia64.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.ia64.rpm
x86_64: bash-3.2-24.el5_6.2.x86_64.rpm bash-debuginfo-3.2-24.el5_6.2.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.9 server):
Source: bash-3.2-32.el5_9.3.src.rpm
i386: bash-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm
ia64: bash-3.2-32.el5_9.3.i386.rpm bash-3.2-32.el5_9.3.ia64.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.ia64.rpm
ppc: bash-3.2-32.el5_9.3.ppc.rpm bash-debuginfo-3.2-32.el5_9.3.ppc.rpm
s390x: bash-3.2-32.el5_9.3.s390x.rpm bash-debuginfo-3.2-32.el5_9.3.s390x.rpm
x86_64: bash-3.2-32.el5_9.3.x86_64.rpm bash-debuginfo-3.2-32.el5_9.3.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux AUS (v. 6.2 server):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-4.1.2-9.el6_2.2.x86_64.rpm bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-4.1.2-15.el6_4.2.i686.rpm bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-4.1.2-15.el6_4.2.ppc64.rpm bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-4.1.2-15.el6_4.2.s390x.rpm bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.2):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm bash-doc-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm bash-doc-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm bash-doc-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm bash-doc-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-7169.html https://www.redhat.com/security/data/cve/CVE-2014-7186.html https://www.redhat.com/security/data/cve/CVE-2014-7187.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1200223
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUJau9XlSAg2UNWIIRAhKkAKC931kAxA4S4exwT4uGhDr7uDFIKQCglKKS N0AJiOto/RXwBqHtbfr1wkM= =SeAK -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Summary
VMware product updates address Bash security vulnerabilities. Relevant Releases (Affected products for which remediation is present)
vCenter Log Insight 2.0
- Problem Description
a. Bash update for multiple products.
Bash libraries have been updated in multiple products to resolve
multiple critical security issues, also referred to as Shellshock.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2014-6271, CVE-2014-7169,
CVE-2014-7186, and CVE-2014-7187 to these issues.
VMware products have been grouped into the following four
product categories:
I) ESXi and ESX Hypervisor
ESXi is not affected because ESXi uses the Ash shell (through
busybox), which is not affected by the vulnerability reported
for the Bash shell. See table 1 for
remediation for ESX.
II) Windows-based products
Windows-based products, including all versions of vCenter Server
running on Windows, are not affected.
III) VMware (virtual) appliances
VMware (virtual) appliances ship with an affected version of Bash.
See table 2 for remediation for appliances.
IV) Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances)
Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances) might use the Bash shell that is part of the
operating system. VMware recommends that customers
contact their operating system vendor for a patch.
MITIGATIONS
VMware encourages restricting access to appliances through
firewall rules and other network layer controls to only trusted IP
addresses. This measure will greatly reduce any risk to these
appliances.
RECOMMENDATIONS
VMware recommends customers evaluate and deploy patches for
affected products in Table 1 and 2 below as these
patches become available.
Column 4 of the following tables lists the action required to
remediate the vulnerability in each release, if a solution is
available.
Table 1 - ESXi and ESX Hypervisor
=================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
ESXi any ESXi Not affected
ESX 4.1 ESX Patch pending *
ESX 4.0 ESX Patch pending *
* VMware will make VMware ESX 4.0 and 4.1 security patches available
for the Bash shell vulnerability. This security patch release is an
exception to the existing VMware lifecycle policy.
Table 2 - Products that are shipped as a (virtual) appliance.
=============================================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
vCenter Server Appliance 5.x Linux Patch Pending
Horizon DaaS Platform 6.x Linux Patch Pending
Horizon Workspace 1.x, 2.x Linux Patch Pending
IT Business Management Suite 1.x Linux Patch Pending
NSX for Multi-Hypervisor 4.x Linux Patch Pending
NSX for vSphere 6.x Linux Patch Pending
NVP 3.x Linux Patch Pending
vCenter Converter Standalone 5.x Linux Patch Pending
vCenter Hyperic Server 5.x Linux Patch Pending
vCenter Infrastructure Navigator 5.x Linux Patch Pending
vCenter Log Insight 1.x, 2.x Linux 2.0 U1
vCenter Operations Manager 5.x Linux Patch Pending
vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending
vCenter Site Recovery Manager 5.x Linux Patch Pending
** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux Patch Pending vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux Patch Pending VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux Patch Pending VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux Patch Pending
** This product includes Virtual Appliances that will be updated, the
product itself is not a Virtual Appliance. Solution
vCenter Log Insight
Downloads: https://www.vmware.com/go/download-vcenter-log-insight (click Go to Downloads) Documentation: http://kb.vmware.com/kb/2091065
- References
VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
- Change Log
2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2014 VMware Inc. All rights reserved.
Release Date: 2014-10-16 Last Updated: 2014-10-16
Potential Security Impact: Remote unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP StoreOnce Backup systems running Bash Shell. However, HP is unaware of any method that would allow this vulnerability to be exploited on HP StoreOnce Backup systems but is providing an updated version of Bash Shell as a precaution.
References:
CVE-2014-7169 CVE-2014-6271 CVE-2014-7187 CVE-2014-7186 SSRT101749
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP StoreOnce Backup software versions 3.0.0 to 3.11.3.
Please refer to the RESOLUTION section below for a list of impacted products.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION HP has made the following updates available to resolve the vulnerability in HP StoreOnce Backup systems running Bash Shell.
HP StoreOnce Backup version 3.11.4 for the following products:
Product SKU Product Name
BB896A HP StoreOnce 6500 Backup
EJ022A HP StoreOnce B6200 Backup
BB903A HP StoreOnce 4900 Backup
BB877A HP StoreOnce 2700 Backup
BB878A HP StoreOnce 4500 Backup
BB879A HP StoreOnce 4700 Backup
HP StoreOnce 2610 iSCSI Backup system
BB852A HP StoreOnce 2620 iSCSI Backup system
BB853A HP StoreOnce 4210 iSCSI Backup system
BB854A HP StoreOnce 4210 FC Backup system
BB855A HP StoreOnce 4220 Backup system
BB856A HP StoreOnce 4420 Backup system
BB857A HP StoreOnce 4430 Backup system
TC458A/AAE HP StoreOnce VSA 10 TB 3 Year Software
D4T77A/AAE HP StoreOnce VSA 4 TB 3 Year Software
HISTORY Version:1 (rev.1) - 16 October 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Relevant releases/architectures:
SJIS (v.
Shift_JIS, also known as "SJIS", is a character encoding for the Japanese language. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may need to be restarted, and affected interactive users may need to re-login. Installing these updated packages without restarting services will address the vulnerability, but functionality may be impacted until affected services are restarted
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-1148", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.7" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.01" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.4" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.1" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.6" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.2" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.3" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.5" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2.48" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.0" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.1" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.3" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.01.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.0.16" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.0" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.05" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.03" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.04" }, { "model": "manageone v100r002c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "barracuda", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "centos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cygwin", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "extreme", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fireeye", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnu bash", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mageia", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mcafee", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "monroe", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "niksun", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "palo alto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qnap security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sophos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "xirrus", "version": null }, { "model": "bash", "scope": "lte", "trust": 0.8, "vendor": "gnu", "version": "4.3 bash43-026" }, { "model": "qts", "scope": "lte", "trust": 0.8, "vendor": "qnap", "version": "4.1.1 build 0927 and earlier" }, { "model": "qts", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": null }, { "model": "manageone v100r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "unified contact center express", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "manageone v100r002c20", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "unity connection", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "paging server", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1689.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.924.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.1" }, { "model": "oceanstor s5300 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.31" }, { "model": "ucs invicta appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secureplatform r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.51" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.166" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.891.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.15" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1012" }, { "model": "manageone v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "e9000 blade server ch220 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1005.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.42" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1039" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "gaia embedded r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura communication manager sp5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.434.0" }, { "model": "telepresence manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1311.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.687.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.365.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.879.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.74" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.92" }, { "model": "protectier appliance edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.926.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.47255" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.39" }, { "model": "oceanstor s5500t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.530.0" }, { "model": "puredata system for operational analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2053-4240" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.58" }, { "model": "ip interoperability and collaboration system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asr series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.122" }, { "model": "key vault", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.59" }, { "model": "database appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.57" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "cloudsystem enterprise software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "junos space ja1500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.2" }, { "model": "oceanstor dorado g2 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "2100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.633.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.0" }, { "model": "download server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.769.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "gaia embedded r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.785.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.225" }, { "model": "secureplatform r77.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.385.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.319.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.908.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.62" }, { "model": "oceanstor s5600 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "unified intelligence center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.374.0" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.52" }, { "model": "secureplatform r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.86" }, { "model": "secureplatform r75.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.40" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1043" }, { "model": "rack server rh2288 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.8" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.604.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.44" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.35" }, { "model": "secureplatform r70", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.150" }, { "model": "gaia embedded r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "vcenter orchestrator appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.756.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.34" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.886.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.123" }, { "model": "ipso r75.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "worklight quality assurance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2" }, { "model": "oceanstor s2200t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.51" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "gaia embedded r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.233" }, { "model": "nvp", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.88" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "oceanstor s6800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.955.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1082.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.760.0" }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.110" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.12" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1658.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.368.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.23" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.594.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.118" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "gaia embedded r75.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.743.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.8" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.2" }, { "model": "finesse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96365" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.83" }, { "model": "2054-e01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.816.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.88" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.13" }, { "model": "telepresence tx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.393.0" }, { "model": "e9000 blade server ch140 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.362.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.618.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.628.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.56" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.815.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.423.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.8" }, { "model": "system storage san80b-4 2498-b80", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.802.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.12" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.46" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "oceanstor s5500t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.323.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.804.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.77" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.370.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.95" }, { "model": "espace uc v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.805.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.789.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.315" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.512.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.901.0" }, { "model": "t520 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "gaia r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura application server sip core pb23", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.0" }, { "model": "associates api management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.729.0" }, { "model": "secureplatform r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.102" }, { "model": "isoc v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.15" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "8700" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.483.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.467.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.10" }, { "model": "secureplatform r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.25" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.0" }, { "model": "qip", "scope": "eq", "trust": 0.3, "vendor": "alcatel lucent", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.1" }, { "model": "ssl vpn", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.5" }, { "model": "e9000 blade server ch242 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1017" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.727.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.748.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.7" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.89" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.379.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.654.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.72" }, { "model": "oceanstor s5500t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4" }, { "model": "rack server rh2285h v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.8" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.73" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.334.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.862.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.37" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.303" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.721.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.0" }, { "model": "system storage san384b-2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-416" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1030" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.132" }, { "model": "uma-db v100r001c00spc302", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.336" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.32" }, { "model": "proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.211" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.602.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.2" }, { "model": "2054-e04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "virtualization provisioning service", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "espace usm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1058.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.931.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.722.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.520.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1022" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.651.0" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "oceanstor s6800t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.109" }, { "model": "aura communication manager utility services sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.16.1.0.9.8" }, { "model": "secure access link gas", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.476.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.61" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.1" }, { "model": "oceanstor s5600t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.690.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.570.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.347.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.13" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.412.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.27" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "vcloud connector", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.634.1" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "secureplatform r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vsphere management assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.329.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.1" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1085.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.664.1" }, { "model": "gaia r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.26" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.596.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.103" }, { "model": "espace cc v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.113" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.69" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.730.0" }, { "model": "oceanstor s5500t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1060.0" }, { "model": "oceanstor s6800t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.40" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.610.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.422.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.48" }, { "model": "oceanstor cse v100r002c00lhwy01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.24" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "aura application server sip core pb28", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.116" }, { "model": "cloud single sign on", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.299.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.31" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.19" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.371.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.56" }, { "model": "secureplatform r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.107" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.1.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.615.0" }, { "model": "telepresence system series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.599.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.51" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.102" }, { "model": "ios-xe for catalyst 4k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.12" }, { "model": "oceanstor hvs85t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.92" }, { "model": "system networking san24b-5 2498-f24", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75250" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1675.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.50" }, { "model": "associates layer mobile access gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "telepresence ip gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.28" }, { "model": "oceanstor s5600t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.873.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.301.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.794.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.40" }, { "model": "oceanstor s5600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.781.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1298.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.18" }, { "model": "secureplatform r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.72" }, { "model": "oceanstor v100r001c10", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "secureplatform r71.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "power hmc r7.9.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.554.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.13" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.08.0.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.631.0" }, { "model": "ios-xe for asr903", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.125" }, { "model": "move scheduler", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.54" }, { "model": "ediscovery identification and collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.477.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.941.0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.4" }, { "model": "secureplatform r75", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.516.0" }, { "model": "qradar security information and event manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.430.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1684.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.457.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1008.0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.943.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.21" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.609.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364160" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.211.0" }, { "model": "ios-xe for isr4400", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.42" }, { "model": "t5565 thin client hp t5565z smart client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "nvp", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.582.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.589.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.575.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1663.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.26" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "media experience engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "message networking sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1280.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.122" }, { "model": "3722-s52", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.39" }, { "model": "vcenter orchestrator appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.726.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1034.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.36" }, { "model": "algo risk service on cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "oceanstor s5800t v200r002c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "gaia embedded r71.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.32" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.716.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.480.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.700.0" }, { "model": "associates application performance management cloud monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "oceanstor s5600t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh310 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.28" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1684.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.5" }, { "model": "oceanstor s6800t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh628 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.21" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.7" }, { "model": "oceanstor s5800t v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1652.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.6" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.627.0" }, { "model": "network convergence system series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.4" }, { "model": "gaia r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.28" }, { "model": "firewall enterprise control center", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.19" }, { "model": "e9000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.826.0" }, { "model": "oceanstor hdp3500e v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.581.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.1" }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.544.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.130" }, { "model": "ipso r77", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1041" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.42" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.336.0" }, { "model": "storeever esl g3 tape library 665h gs12501", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "associates layer api gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.124" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1295.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.922.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.113" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.638.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.21" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.910.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.149" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1686.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.90" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.6" }, { "model": "firewall enterprise control center", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.671.0" }, { "model": "bsc6000 v900r008c15", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.66" }, { "model": "oceanstor s2600 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.68" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.424.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.39" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.898.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.478.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.540.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.57" }, { "model": "system storage san384b", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-192" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "67000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.46" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1004.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.136" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.935.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.821.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.1" }, { "model": "studio", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.492.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.33" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57550" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.923.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.948.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.114" }, { "model": "rack server rh2288h v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1024.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.784.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.48" }, { "model": "oceanstor css v100r001c03", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.30" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.44" }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.80" }, { "model": "system storage san06b-r 2498-r06", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "business service automation essentials", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.16" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.16" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.90" }, { "model": "fusionmanager v100r003c10cp6001", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.2" }, { "model": "secureplatform r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia embedded r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.92" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.683.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.425.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.486.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.747.0" }, { "model": "oceanstor vis6600t v200r003c10spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.333" }, { "model": "websphere process server hypervisor edition for novell suse", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.9" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.2" }, { "model": "studio beta", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "qradar risk manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "storefabric b-series switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1300.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.17" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.42" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mxe series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1028" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.33" }, { "model": "vcloud automation center", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.773.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.26" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "oceanstor s5800t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.10" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.157" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.739.0" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.5.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.19" }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.27" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491059" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.2" }, { "model": "ios-xe for csr1000v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.159.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18" }, { "model": "oceanstor sns5120 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1028.0" }, { "model": "aura application server sip core pb5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1013" }, { "model": "espace vcn3000 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.658.0" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9.1" }, { "model": "e9000 chassis v100r001c00spc200", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vcenter server appliance update b", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1023" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.761.0" }, { "model": "cloud services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.690.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.16" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.660.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1676.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.41" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.137" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1669.1" }, { "model": "secure access remote access concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.587.0" }, { "model": "usc invicta series autosupport portal", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.16" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.321.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.14" }, { "model": "secureplatform r71.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.48" }, { "model": "nexus switch for nexus series 5.0 u1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v3000" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.62" }, { "model": "fusionaccess v100r005c10spc203", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.861.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.524.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.717.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.11" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.880.0" }, { "model": "oceanstor s2600t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.607.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.471.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.61" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.59" }, { "model": "gaia embedded r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.923.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.37" }, { "model": "oceanstor cse v100r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.232" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.58" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.778.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.74" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.03" }, { "model": "protectier entry edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "horizon daas platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.655.0" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.579.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.0" }, { "model": "oceanstor s5600t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1008" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.694.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.669.0" }, { "model": "ds8000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.97" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3" }, { "model": "gaia embedded r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "visualization fault and performance manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "gtsoftx3000 v200r001c01sph106", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.190.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.3.05.00" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.400.0" }, { "model": "vertica", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.0" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.74" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.592.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.26" }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "storeever esl e-series tape library", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vds service broker", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.902.0" }, { "model": "telepresence multipoint switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "ipso r70.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "oceanstor s3900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ipso r77.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "ip deskphones", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.39" }, { "model": "d9036 modular encoding platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1272.0" }, { "model": "fusionstorage dsware v100r003c02spc201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r75.47", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.548.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.640.0" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.2" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.23" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "qradar vulnerability manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.88" }, { "model": "oceanstor v100r001c02", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v1800" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.18" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.110" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.514" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.759.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.587.1" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.59" }, { "model": "oceanstor s5800t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "n series oncommand 6.1r1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.42" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "esight network v200r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77000" }, { "model": "e6000 blade server bh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.56" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.69" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.13" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.3" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1661.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.30" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.662.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.149" }, { "model": "gaia r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "flashsystem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v8400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.833.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.47" }, { "model": "gaia r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.119" }, { "model": "vcenter hyperic server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "privileged identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.2" }, { "model": "vcenter operations manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.810.0" }, { "model": "ipso r75.40vs", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "gaia ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.23" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.871.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.31" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.41" }, { "model": "system storage san40b-4 2498-b40", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "e6000 chassis v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1681.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.649.0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.78" }, { "model": "oceanstor s5600t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.1" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.316.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.9" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.90" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75350" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.692.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.7" }, { "model": "universal small cell cloudbase", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11" }, { "model": "cloudsystem foundation", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.639.0" }, { "model": "wireless lan wos with aos", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "91007.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.98" }, { "model": "quantum son suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.630.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.154.0" }, { "model": "telepresence recording server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.885.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.52" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "ipso r71.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.569.0" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7755061.090.225.06200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.962.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1675.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.0" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.295.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.123" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.318.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.619.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.14" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.63" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "t620 flexible quad core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.6" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7835" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1004" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.86" }, { "model": "nsm3000", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1033" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.100" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3050" }, { "model": "secureplatform r71.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1044" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.160" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1679.0" }, { "model": "secureplatform r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia embedded r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7225" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.56" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.11.3" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.539.0" }, { "model": "e6000 blade server bh622 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.661.0" }, { "model": "insight control for linux central management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.91" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.939.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.474.0" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.893.1" }, { "model": "audit vault and database firewall", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "vertica", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1.1-0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.42" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.1" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.883.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.306" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.62" }, { "model": "galax8800 v100r003c10cp6001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.348.0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.515" }, { "model": "life cycle management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.62" }, { "model": "t410 smart zero client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.7" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.935.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.705.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1082.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.122" }, { "model": "application dependency planner", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.395.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1016.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.776.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.84" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x0" }, { "model": "system storage san768b-2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-816" }, { "model": "oceanstor s6800t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1075.0" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.33" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.172" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.20" }, { "model": "oceanstor uds v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.117" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.16" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.443.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.296.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "gaia r70.1", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "secure access core concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.34" }, { "model": "esight network v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.18" }, { "model": "videoscape distribution suite transparent caching", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.776.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96379" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.217" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.40" }, { "model": "9710-e08", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "vcenter infrastructure navigator", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1074.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.900.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.75" }, { "model": "junos space ja2500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.71" }, { "model": "enterprise linux server eus 6.5.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.611.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.407.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.892.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.29" }, { "model": "vsphere big data extensions", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.518.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.346.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1658.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.897.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.102" }, { "model": "oceanstor css v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.421.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.56" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "prime lan management solution", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.0" }, { "model": "ipso r75.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcenter log insight", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "36.0.1985.143" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1003.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.927.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.23" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "storeever esl g3 tape library 671h gs00601", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "nexus switch for nexus series 4.0 n1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v5000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.16" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1021.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.462.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.77" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.51" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.818.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.645.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.4" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.1.1539" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1065.0" }, { "model": "database appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2" }, { "model": "storeever esl g3 tape library 663h gs04601", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.674.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.39" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57350" }, { "model": "hyper-scale manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.905.0" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.4" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "gaia r71.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.84" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.34024" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.115" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1040.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.939.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "secureplatform r77", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.758.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.116" }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.184" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.154" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.419.0" }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.608.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.40" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.135" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.675.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.124" }, { "model": "high-density server dh620 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.9" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1072.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.102" }, { "model": "oceanstor s2600t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.435.0" }, { "model": "oceanstor vtl6000 v100r003c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.617.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.9" }, { "model": "storeever esl g3 tape library 655h gs10201", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1019.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.64" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.685.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.312" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.30" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.699.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.961.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.202" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75300" }, { "model": "ucs b-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.341" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.57" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1058" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1662.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1669.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1054" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.506.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.16" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.168" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.35" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1286.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.703.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.668.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.744.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "configuration and orchestration manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.74" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75450" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1078.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.328.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.91" }, { "model": "sig9800 sig9800-x16 v300r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.381.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.144" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1283.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.25" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.711.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.330" }, { "model": "automation insight", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.21" }, { "model": "vcenter log insight", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "ios-xe for asr1k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.147" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.797.0" }, { "model": "secureplatform r75.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oic v100r001c00spc403", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.14443" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.521.0" }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.46" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.774.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.2" }, { "model": "business edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.803.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.623.0" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.51" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.21" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.49" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.345.0" }, { "model": "secureplatform r71.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1001.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.859.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1674.1" }, { "model": "business service automation essentials", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.930.0" }, { "model": "starter kit for cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.562.0" }, { "model": "gaia embedded r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.798.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.227" }, { "model": "oceanstor s2600t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.59" }, { "model": "dc health check", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.85" }, { "model": "enterprise linux long life 5.9.server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.111" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7855" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.647.0" }, { "model": "uma v200r001c00spc202", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.937.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.26" }, { "model": "gaia embedded r75", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor s5800t v200r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.277.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.71" }, { "model": "gss 4492r global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.30" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.136" }, { "model": "t510 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.867.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.120" }, { "model": "gaia r71.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.329" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.25" }, { "model": "rack server rh2285 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.746.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.70" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1287.1" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.753.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1038.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.7" }, { "model": "nvs v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.496.0" }, { "model": "manageone v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.294.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.728.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.706.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.824.0" }, { "model": "2054-e07", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.28" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.0" }, { "model": "unstructured data identification and mgmt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.35" }, { "model": "ipso r71.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.585.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.68" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "e6000 blade server bh640 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.557.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.91" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.15" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.549.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.111" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.1" }, { "model": "boot attestation service", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "vcloud director appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "global threat intelligence proxy", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.207" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.440.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.343.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1053.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.957.0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.573.0" }, { "model": "high-density server dh320 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1055" }, { "model": "espace dcm v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.806.0" }, { "model": "enterprise linux server eus 6.4.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "oceanstor v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "18800" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.863.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.652.0" }, { "model": "oceanstor s2600t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.5" }, { "model": "exalytics", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.719.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.952.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "secureplatform r75.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1019" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.872.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.57" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1022.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.153" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.341.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.11" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.223" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1657.0" }, { "model": "espace ums v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1273.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1274.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1056.0" }, { "model": "oceanstor s6800e v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1303.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1015" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.714.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.8" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.13" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.6" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.150" }, { "model": "secureplatform r70.1", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.230" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.942.0" }, { "model": "gaia embedded r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.4" }, { "model": "aura application server sip core pb19", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "oceanstor s5600t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.49" }, { "model": "prime ip express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.7" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.720.0" }, { "model": "healthanalyzer", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.904.0" }, { "model": "gaia r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.212" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "oceanstor s5900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.55" }, { "model": "strm/jsa", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.22" }, { "model": "autobackup server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1659.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1052.0" }, { "model": "videoscape conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.305.0" }, { "model": "high-density server xh310 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1034" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.2.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.145" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.646.0" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.697.0" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.222" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.593.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.41" }, { "model": "quantum virtualized packet core", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.7" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.120" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.100" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.20" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.339.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1060.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.626.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1031.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.80" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.708.0" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.559.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.625.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.64" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "e9000 blade server ch240 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "oceanstor 9000e v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1009.0" }, { "model": "oceanstor css v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.326" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1062.1" }, { "model": "hyperdp oceanstor n8500 v200r001c09", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.881.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.800.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.680.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.659.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37599" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.330.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.2" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.93" }, { "model": "power hmc r7.6.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "rack server rh1288 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1001" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.18" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11000" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.70" }, { "model": "tam data manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1056" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.33" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.768.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.871.0" }, { "model": "gaia embedded r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "9710-e01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "qradar security information and event manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.35" }, { "model": "oceanstor hvs85t v100r001c99", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1304.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.61" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "ipso r75.46", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.670.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.378.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.27" }, { "model": "qlogic gb intelligent pass-thru module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "87.10.1.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1037" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.611.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1060" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.300.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.509.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.387.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.3" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.290.0" }, { "model": "oceanstor s5500t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7970" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.50" }, { "model": "gaia os r75.0", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.386.0" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.15" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1056.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.839.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1277.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.764.0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.616.0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.66" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.105" }, { "model": "nexus intercloud for vmware", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.45" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.564.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1046" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1081.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.868.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.2" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.42" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1.72" }, { "model": "oceanstor s6800t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.397.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.70" }, { "model": "secureplatform r70.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.99" }, { "model": "oceanstor n8000 oceanstor s2300", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v100" }, { "model": "prime collaboration provisioning", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.85" }, { "model": "security access manager for enterprise single sign-on", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.7" }, { "model": "move antivirus multi-platform", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.0" }, { "model": "ib6131 40gb infiniband switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.491.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.74" }, { "model": "exadata storage server software", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "nsm3000 appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1054.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.1" }, { "model": "espace u2990 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1289.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.58" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.825.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.814.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.600.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.566.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.132" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.137" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.877.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.860.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.475.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1070.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.102" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.2" }, { "model": "local collector appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.2.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.958.1" }, { "model": "gaia r77.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.94" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.16" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.3" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.11" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.31" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4" }, { "model": "oceanstor s8100 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "gaia embedded r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.108" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.32" }, { "model": "vcenter application discovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1020.0" }, { "model": "enterprise linux els", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.614.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.57" }, { "model": "gaia embedded r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.344.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.9" }, { "model": "move antivirus multi-platform", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.235" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.156.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.111" }, { "model": "flashsystem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.18" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.715.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7535061.121.225.06100" }, { "model": "service control engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "80000" }, { "model": "secureplatform r75.40vs", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "t620 flexible dual core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "oceanstor s6800t v100r005c50", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.17" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.505.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1063.0" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.286.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "gaia embedded r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor vis6600t v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.15" }, { "model": "vcloud automation center application services", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.723.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.105" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.725.0" }, { "model": "oceanstor 9000e v100r002c19", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storefabric h-series switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.224" }, { "model": "ipso r70.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.8" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.52" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.358.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.2" }, { "model": "vcenter infrastructure navigator", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.754.0" }, { "model": "ipso r75", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.58" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1007" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1659.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.783.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.19" }, { "model": "ios-xr", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1047" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1052" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.78" }, { "model": "gaia r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1690.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.687.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.308" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.820.0" }, { "model": "associates user activity reporting module", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1044.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.109" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "infosphere balanced warehouse c3000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.432.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.731.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.89" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.560.0" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.819.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.324.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1048" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1032.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.162" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.433.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.153" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1687.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.903.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.733.0" }, { "model": "gaia r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "t610 plus flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.749.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.113" }, { "model": "ediscovery identification and collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.762.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.719.0" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.12" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.72" }, { "model": "secureplatform r70.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.271.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.813.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.7" }, { "model": "oceanstor dorado5100 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.211" }, { "model": "oceanstor s2600t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.673.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.622.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1063.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.187" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.383.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.790.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.319" }, { "model": "esight uc\u0026c v100r001c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.658.1" }, { "model": "vcenter server appliance patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.8" }, { "model": "fusionmanager v100r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.37" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "secureplatform r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.932.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.101" }, { "model": "oceanstor s6800t v100r005c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1064.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.0" }, { "model": "power hmc r7.8.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1651.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.6" }, { "model": "espace u2990 v200r001c10spc102", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1003.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.114" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.391.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.107" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1664.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.18" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "ios-xe for catalyst air-ct5760", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtual pgw softswitch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "22000" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7238" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.2" }, { "model": "video surveillance media server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.755.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1031" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.18" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "elog v100r003c01spc506", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1007.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.326.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1680.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.11" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.686.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.23" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1010" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.113" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.337" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.28" }, { "model": "intelligent automation for cloud", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7530061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.29" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.3" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "78000" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.37" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1051" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.98" }, { "model": "oceanstor s5500t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "telepresence te software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "secureplatform r71.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.896.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.59" }, { "model": "secureplatform r71", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "secureplatform r70.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "socialcast on premise", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.152" }, { "model": "e6000 blade server bh620 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.417.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.218" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.334" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.657.0" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.0" }, { "model": "isoc v200r001c02spc203", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1049" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7242" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.331" }, { "model": "secureplatform r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.4" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9393" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1057" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1673.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.689.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.152" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.55" }, { "model": "qradar incident forensics mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1288.0" }, { "model": "gtsoftx3000 v200r001c01spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.390.0" }, { "model": "rack server rh2485 v100r002c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1655.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.707.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.76" }, { "model": "secureplatform r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "gaia r75.45", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "algo one managed data service on cloud", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1081.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1011.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1067.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1664.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "oceanstor vis6600 v100r002c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.801.0" }, { "model": "nexus running nxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1048.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.807.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.865.0" }, { "model": "espace cad v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1296.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.481.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.489.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.9" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.55" }, { "model": "ipso r75.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.97" }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "elog v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7556061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.69" }, { "model": "enterprise content delivery service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.50" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.510" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.96" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.8" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77750" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.572.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1055.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "ipso r75.47", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.786.0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "36.0.1985.122" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.20" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.59" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1039.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.836.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.23" }, { "model": "oceanstor dorado2100 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.1" }, { "model": "ace application control engine module for the cisco catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.591.0" }, { "model": "flex system 40gb ethernet", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.107" }, { "model": "secureplatform ngx r65", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.278.0" }, { "model": "pod orchestration suite", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.413.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.95" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.67" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.580.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.123" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.146" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.4" }, { "model": "chrome", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "38.0.2125.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.513.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.30" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "nsmexpress", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "secure access link", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1042" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.158.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.761.1" }, { "model": "oceanstor sns2120 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.30" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.130" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.765.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.553.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.494.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.745.0" }, { "model": "ipso r71", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.484.0" }, { "model": "vsphere big data extensions", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.15" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.52" }, { "model": "oceanstor cse v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1061.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.829.1" }, { "model": "oceanstor hvs88t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.35" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.482.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.32" }, { "model": "aura communication manager ssp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "telepresence te software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ipso r70.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "prime collaboration deployment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.76" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.677.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.890.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.770.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.364.0" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "c-series nexus 5k switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.349.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.69" }, { "model": "unified computing system b-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "studio", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.37" }, { "model": "workbench", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "application and content networking system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.15" }, { "model": "system storage san48b-5 2498-f48", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "gaia r70.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.83" }, { "model": "gaia r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7845" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.63" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "75560" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1297.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1026" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1068.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.33" }, { "model": "secureplatform r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.10" }, { "model": "fusionstorage dsware v100r003c02spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.762.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.1" }, { "model": "services provisioning platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "privileged identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1.1" }, { "model": "secureplatform r75.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "power hmc r7.3.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.723.1" }, { "model": "websphere process server hypervisor edition for red hat", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.884.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1038" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1068.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.621.0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.310" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.14" }, { "model": "espace v1300n v1300n v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.36" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.12" }, { "model": "puredata system for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1006" }, { "model": "smartcloud provisioning fixpack interi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.14" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.811.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.709.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.43" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.54" }, { "model": "oceanstor uds v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.882.0" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13000" }, { "model": "enterprise linux eus 5.9.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.384.0" }, { "model": "secureplatform r75.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia r70.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.111" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.19" }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.44" }, { "model": "power hmc r7.7.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.134" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.721.1" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.750.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.563.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.24" }, { "model": "2417-c48", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.193.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.771.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.59" }, { "model": "enterprise s-jis service", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.43" }, { "model": "diagnostic server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.8" }, { "model": "oceanstor s5500 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ipso r77.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.906.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.24" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.6" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.114" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.202" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.86" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.363.0" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.601.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1306.0" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.14" }, { "model": "information archive", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.812.0" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7245" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.944.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.635.0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7525061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.89" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77550" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "5955" }, { "model": "oceanstor s3900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.156" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1660.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1047.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.44" }, { "model": "aura communication manager ssp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.473.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.441.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.1" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "oceanstor s5500t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1040" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1037.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.0" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.53" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.426.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.752.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.43" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.5" }, { "model": "oceanstor n8500 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.834.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.327.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1654.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.112" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "oceanstor s5800t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "t410 all-in-one rfx/hdx smart zc", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.15" }, { "model": "webex node", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.493.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.103" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.327" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.186" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.10" }, { "model": "ipso ngx r65", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.956.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1662.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.217" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491036" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.108" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.7" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "system storage san768b", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2499-384" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.522.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.38" }, { "model": "data center analytics framework", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.30" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.622.1" }, { "model": "fusioncompute v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.91" }, { "model": "digital media players", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.159" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mirage gateway", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1062.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.152.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.556.0" }, { "model": "oceanstor vtl3500 v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.53" }, { "model": "identity engines ignition server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.119" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.161" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.772.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1059.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.29" }, { "model": "ipso r70", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.398.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.140" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.53" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.321" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.870.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1006.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.91" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.14127" }, { "model": "secure access remote access concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1653.1" }, { "model": "virtualization experience client", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "62150" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1083.0" }, { "model": "nexus virtual supervisor module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.301" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.335" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.695.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1021" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1688.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.325" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.732.0" }, { "model": "video distribution suite for internet streaming vds-is", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1290.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.26" }, { "model": "vcloud usage meter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.712.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1286.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.558.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.822.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.120" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.665.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.629.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.13974" }, { "model": "oceanstor s5800t v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1012.0" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.339" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.109" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.763.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.947.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1276.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.168" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.878.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.542.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1663.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.48" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.837.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1014" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.43" }, { "model": "aura application server sip core pb3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "high-density server xh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.929.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.324" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.510.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.1549" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.410.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.787.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.323" }, { "model": "oceanstor 9000e v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.82" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.292.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.405.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.684.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.796.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.153.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.4" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.6" }, { "model": "ios-xe for catalyst 3k", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1076.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.123" }, { "model": "gaia embedded r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7830" }, { "model": "system networking san96b-5 2498-f96", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.103" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.02" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "57100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.757.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.40" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "8900" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.832.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1066.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.50" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.702.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.316" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.1" }, { "model": "rack server rh5885h v100r003c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.221.8" }, { "model": "ipso r75.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.403.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.0" }, { "model": "powervu d9190 conditional access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.304.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1018.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1278.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.229" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.572.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.146" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.139" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1282.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.303.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.4" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "gaia embedded r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.26" }, { "model": "aura communication manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.51" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.21" }, { "model": "elog v200r003c10spc202", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "e9000 blade server ch121 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.436.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.21" }, { "model": "totalstorage san16b-2 fabric switch 2005-b16", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1030.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.340" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.45" }, { "model": "move", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1689.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.2" }, { "model": "uma v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.81" }, { "model": "aura communication manager ssp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.343" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.679.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.38" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.103" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.893.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.644.0" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.70" }, { "model": "network configuration and change management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "associates customer experience manager transaction impact monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "ip deskphones", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.570.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.17" }, { "model": "totalstorage san256b director model m48 2109-m48", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.81" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.313.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.351.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.933.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.10" }, { "model": "gaia os r76.0", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "oceanstor s5800t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "ipso r75.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.887.0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.3" }, { "model": "advanced threat defense", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7755061.090.224.30300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.23" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1288.1" }, { "model": "exalogic", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "oceanstor uds v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.36" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1498.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.793.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.1" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1301.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.71" }, { "model": "system storage san24b-4 2498-b24", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.29" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core pb25", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1043.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1000.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.317" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.909.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.886.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.14" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "36550" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.318" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.115" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.936.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.488.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.526.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.56" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0.3" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.808.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.287.0" }, { "model": "telepresence", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.584.0" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1042.0" }, { "model": "bash rc1", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.33" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.907.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.120" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7232" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.29" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1685.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.25" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.81" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.823.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.791.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.577.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.8" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "oceanstor s5800t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1061.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.91" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10500" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7765061.090.225.06200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.676.0" }, { "model": "virtual library system", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.525.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.10" }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.681.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.309" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.97" }, { "model": "ironport encryption appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.214" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "oceanstor s6900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1050" }, { "model": "storeonce gen backup software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "22.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.135" }, { "model": "oceanstor css v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.11" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.950.0" }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.78" }, { "model": "secureplatform r75.40vs", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oneview", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.613.0" }, { "model": "espace meeting v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.32" }, { "model": "system networking san96b-5 2498-n96", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.182.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1276.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.163" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1281.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1049.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.304" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.162" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "77650" }, { "model": "vfabric postgres", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.1.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.305" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.862.0" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.023" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.464.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.682.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.15" }, { "model": "protectier enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "services vm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.940.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.5" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "oceanstor css v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.22" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "smart care", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1683.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.48" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.376.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.50" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1077.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1025" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.921.3" }, { "model": "oceanstor uds v100r002c00lvdf0", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.17" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "oceanstor s5600t v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.10" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.155" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.538.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.519.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1041.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.69" }, { "model": "high-density server dh321 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.561.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1306.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1311.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.586.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.93" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "storeever esl g3 tape library", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.766.0" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.740.0" }, { "model": "proactive network operations center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.50" }, { "model": "gaia r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.603.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.45" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "email and web security appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.6" }, { "model": "espace ivs v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.830.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.75" }, { "model": "oceanstor s5500t v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.399.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.131" }, { "model": "advanced threat defense", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.2" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.2" }, { "model": "oceanstor s2600t v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.925.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.64" }, { "model": "oceanstor n8300 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.864.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1076.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.9" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.117" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.63" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7765061.090.224.30300" }, { "model": "it business management suite", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "oceanstor s5600t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "t620 plus flexible quad core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.208" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1682.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.959.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.106" }, { "model": "oceanstor v100r001c01", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "virtualization performance viewer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.2.149.27" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.624.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.40" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.156" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.26" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.18" }, { "model": "propel", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1293.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.38" }, { "model": "oceanstor s5500 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1654.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.698.0" }, { "model": "secureplatform r75.46", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.13" }, { "model": "ipso r71.10", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1079.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.338" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.598.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.89" }, { "model": "high-density server xh321 v100r002c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1287.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.894.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.30" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "data recovery", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1061" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.906.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.737.0" }, { "model": "oceanstor s5800t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1284.1" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.214" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.21" }, { "model": "storeonce backup", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.23" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1672.2" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.52" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "websphere process server hypervisor edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.9." }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.54" }, { "model": "oceanstor v100r001c02", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v1500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.7" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.320" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.124" }, { "model": "nsx for vsphere", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.81" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3090" }, { "model": "services vm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.311" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.693.0" }, { "model": "oceanstor vtl6900 v100r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.736.0" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.4" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9303" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.1.1538" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1069.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1668.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1019.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.606.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.438.0" }, { "model": "encryption switch 2498-e32", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.3" }, { "model": "oceanstor css v100r001c05", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.120" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.11" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7235" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.209" }, { "model": "idp series", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.113" }, { "model": "phaser r14-12 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7800081.150.104.35600" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1299.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.226" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.869.0" }, { "model": "dc v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.738.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.231" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.32" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "gaia r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.2" }, { "model": "secureplatform r71.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "oceanstor s5800t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.116" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.13" }, { "model": "secureplatform ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.578.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.54" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.63" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.29" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.958.0" }, { "model": "agile controller v100r001c00spc205", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.380.0" }, { "model": "cloud single sign on", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.809.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5(2)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1681.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.3" }, { "model": "gaia embedded r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.361.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1018" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "hyperdp oceanstor n8500 v200r001c91", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.701.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.4.154.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.780.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.116" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.605.0" }, { "model": "t620 plus flexible dual core thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1051.0" }, { "model": "physical access gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.51" }, { "model": "ipso r71.45", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "secure access link policy server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.49" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.55" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.663.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.537.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "phaser r14-12 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "6700081.140.105.00700" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1275.0" }, { "model": "oic v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.133" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.96" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.9" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1046.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.122" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "t610 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1062" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.934.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.928.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1020" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.469.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.9" }, { "model": "smartcloud provisioning fixpack for sv", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1080.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.67" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.0" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "espace uc v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "2054-e11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.4" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "secureplatform r70.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.951.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.55" }, { "model": "gaia r71", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.4" }, { "model": "workcentre r15-03 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7775061.090.225.06200" }, { "model": "oceanstor s2200t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.0" }, { "model": "netflow collection agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.130" }, { "model": "infosphere balanced warehouse c4000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.414.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.55" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.332" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.85" }, { "model": "unified communications domain manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.108" }, { "model": "secure access control server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.688.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1050.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.479.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.11" }, { "model": "oceanstor s5600 v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.960.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.838.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.394.0" }, { "model": "network security sensor appliance", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.1" }, { "model": "oceanstor s2600 v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.718.0" }, { "model": "secureplatform r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "uma-db v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.890.1" }, { "model": "oceanstor s2200t v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "service control engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.20" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.528.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.30" }, { "model": "rack server rh2288e v100r002c", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1676.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.100" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.62" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491064" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.84" }, { "model": "sal gw virtual app", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.25" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1023.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.325.0" }, { "model": "high-density server xh320 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.33" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.57" }, { "model": "secure access core concentrator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.46" }, { "model": "espace vtm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.724.0" }, { "model": "oceanstor hdp3500e v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.431.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.10" }, { "model": "configuration and orchestration manager com", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.47" }, { "model": "cloud identity manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.498.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.51" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.406.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.938.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.515.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1294.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.36" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.2.1" }, { "model": "fusionaccess v100r005c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.91275" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.409.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.68" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.775.4" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.315.0" }, { "model": "network convergence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.741.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.170.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.588.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.75" }, { "model": "galax8800 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1045.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.799.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.104" }, { "model": "secureplatform r77.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1073.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.152" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.792.0" }, { "model": "secureplatform r77.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "ipso r71.20", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "storefabric c-series mds switches", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "gaia embedded r75.20", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.9" }, { "model": "uma v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1667.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.21" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.1" }, { "model": "omm solution v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.322" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1279.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.272.0" }, { "model": "secureplatform r75.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.97" }, { "model": "gaia embedded ngx r65", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "associates application performance management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.411.0" }, { "model": "oceanstor vtl6000 v100r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.47" }, { "model": "elog v100r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r70", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.5" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.367.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1045" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1016" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.106" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.454.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.634.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.53" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "oceanstor s5800t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1029.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.2" }, { "model": "fusionstorage dsware v100r003c02spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.337.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.54" }, { "model": "message networking sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.43" }, { "model": "e9000 blade server ch222 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1032" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1302.0" }, { "model": "nexus switch for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v70004.1.(2)" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.118" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.51" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.10" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.945.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.1" }, { "model": "network performance analytics", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system storage storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1666.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.895.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.355.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "smart zero core", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "supercluster", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.21" }, { "model": "e9000 blade server ch221 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.49" }, { "model": "gaia r75", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1272.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.234" }, { "model": "galax8800 v100r002c85", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.21" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.103" }, { "model": "move antivirus agentless", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.0" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "big data appliance", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.650.0" }, { "model": "gaia embedded r77", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.19" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.8" }, { "model": "oceanstor s6800t v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.338.0" }, { "model": "vcenter server appliance update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.451.0" }, { "model": "vsphere app ha", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.135" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.59" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1301.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.29" }, { "model": "saas web protection", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.868.0" }, { "model": "agile controller v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1304.1" }, { "model": "webex pcnow", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.19" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.4" }, { "model": "oceanstor s6800t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "qlogic 20-port 8gb san switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.10.1.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.45" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "oceanstor cse v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1671.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.15" }, { "model": "power hmc r8.1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1017.0" }, { "model": "web element manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime network services controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.427.0" }, { "model": "e9000 blade server ch242 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "ipso r70.1", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1024" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.16" }, { "model": "traffix sdc", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.43" }, { "model": "oceanstor s5500t v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.276.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.117" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "espace u2980 v100r001c10spc102", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.933.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.642.0" }, { "model": "netauthenticate", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.574.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.936.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.38" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.27" }, { "model": "3722-s51", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "workcentre r14-10 spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7775061.090.224.30300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.64" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.320.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.946.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.65" }, { "model": "ads virtual app", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.48" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.888.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.18" }, { "model": "access registrar appliance cisco prime access registrar applianc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1307.0" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.224.0" }, { "model": "rack server rh5885 v100r001c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1678.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.97" }, { "model": "socialminer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.704.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.149" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.60" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1035" }, { "model": "policy assessment and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "ipso r76", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1291.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.68" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.2" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "20500" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.43" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "oceanstor 18800f v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.59" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3" }, { "model": "espace uc v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "29.0.1547.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.41" }, { "model": "espace uc v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.632.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.158" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.154" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.328" }, { "model": "operation agent virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.9" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.889.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.777.2" }, { "model": "aura application server sip core pb26", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "vae v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.899.0" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.2" }, { "model": "websphere process server hypervisor edition for novell suse", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1029" }, { "model": "gaia r71.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.571.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.57" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1677.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.82" }, { "model": "esight network v200r003c10spc206", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.734.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.954.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.4" }, { "model": "gaia embedded r75.46", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "gaia r70.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "aura communication manager sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.667.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1310.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.34" }, { "model": "t505 flexible thin client", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.342" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.93" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.485.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.678.0" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.16" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "virtual compute appliance software", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "puredata system for analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.372.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.949.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.638.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.392.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.212" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2053-4340" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.1" }, { "model": "websphere transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1063" }, { "model": "gaia embedded r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.710.0" }, { "model": "sig9800 sig9800-x16 v300r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.206" }, { "model": "fusioncompute v100r003c10cp6001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.11" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1685.0" }, { "model": "vpn gateway", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3070" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.735.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.568.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.487.0" }, { "model": "ipso r70.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.129" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.124" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.9" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.590.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.113" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.827.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.23" }, { "model": "rack server rh5885 v100r003c0", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v3" }, { "model": "gaia r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "system storage san04b-r 2005-r04", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.332.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.953.0" }, { "model": "oceanstor s2600t v100r005c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.666.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1071.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1013.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "collaboration pod on vmware vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.41" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0.23988" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.340.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57450" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.373.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.2" }, { "model": "thinpro", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1036.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.50" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.353.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.2" }, { "model": "gaia r75.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7228" }, { "model": "oceanstor s6900 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.26" }, { "model": "policy assessment and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.47" }, { "model": "secureplatform r75.30", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.470.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.461.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1285.1" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.446.0" }, { "model": "secureplatform r75.47", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "move firewall", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "3.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.88" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.5" }, { "model": "nsmxpress appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.357.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.459.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.541.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.221" }, { "model": "espace u2980 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.18" }, { "model": "nexus switch for nexus series 4.1 e1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v4000" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.333.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.779.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.57" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.42" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "6655" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.9" }, { "model": "bsc6000 v900r008c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.307" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1027" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.396.0" }, { "model": "network security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.157" }, { "model": "bsc6000 v901r013c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.110" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.428.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.612.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1035.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.767.0" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9301" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.891.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.460.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1001.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.87" }, { "model": "siem enterprise security manager", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.2" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "galax8800 v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secureplatform r71.50", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1053" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.74" }, { "model": "viewplanner", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.8" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "5945" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.455.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1014.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.449.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.142" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.911.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.620.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.497.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.82" }, { "model": "oceanstor s5900 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.576.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1015.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.795.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "secureplatform r76", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "2.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1010.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.12" }, { "model": "gaia embedded r70.40", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.148" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.99" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1682.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.751.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.636.0" }, { "model": "secure access link gas", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "oceanstor s5300 v100r005c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.313" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.5" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "65.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.12" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "57400" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.64" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1670.5" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.456.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.831.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.65" }, { "model": "saas email protection", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "1.0" }, { "model": "oceanstor s6800t v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "high-density server dh621 v100r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "v2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.38" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "secureplatform r76", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.111" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.67" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.550.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1305.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.583.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.595.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1009" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0.1847.131" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.108" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.3.154.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.94" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.866.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1673.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "30.0.1599.101" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "workcentre spar", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "7545061.121.225.06100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.131" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.15" }, { "model": "secureplatform r71.10", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.128" }, { "model": "configuration and orchestration manager vps", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.62" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-320" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.653.0" }, { "model": "aura application server sip core pb16", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1656.1" }, { "model": "associates layer api management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "22.0.1229.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.35" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.713.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.643.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.22" }, { "model": "fusioncompute v100r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1057.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.228" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.504.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1312.12" }, { "model": "ipso r71.40", "scope": "eq", "trust": 0.3, "vendor": "checkpoint", "version": "6.2" }, { "model": "unstructured data identification and mgmt", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.767.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "24.0.1292.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1058.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-370" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.129" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.21" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.41" }, { "model": "next generation firewall", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.14150" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.218" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.05" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.4" }, { "model": "gaia r71.50", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.68" }, { "model": "espace dcm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.359.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.26" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.83" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.565.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.3" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.567.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37586" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.33" }, { "model": "oceanstor cse v100r002c00lsfm01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "27.0.1453.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.238" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.656.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.55" }, { "model": "ip flow manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.53" }, { "model": "b189 ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.022" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1011" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1033.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.788.0" }, { "model": "gaia embedded r70.30", "scope": null, "trust": 0.3, "vendor": "checkpoint", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.691.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70154" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-7187" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "128752" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "128755" } ], "trust": 0.9 }, "cve": "CVE-2014-7187", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-7187", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2014-000126", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-7187", "trust": 1.8, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2014-000126", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201409-1073", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2014-7187", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nGNU Bash 3.2 and later are vulnerable; prior versions may also be affected. \n\n HP StoreEver ESL E-series Tape Library\n\n - Disable DHCP and only use static IP addressing. \n\n HP Virtual Library System (VLS)\n\n - Disable DHCP and only use static IP addressing. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. \n\nOpen the PXE Configuration Utility on the HP Insight Control server\ndeployment window\nSelect Linux Managed from the Boot Menu options\nClick the Edit button. Clicking the Edit button displays the Edit Shared Menu\nOption window\nUncheck the x86 option in Operating System and Processor Options and click\nOK. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: bash security update\nAdvisory ID: RHSA-2014:1311-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html\nIssue date: 2014-09-26\nCVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 \n=====================================================================\n\n1. Summary:\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AS (v. 4 ELS) - i386, ia64, x86_64\nRed Hat Enterprise Linux AUS (v. 6.2 server) - x86_64\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64\nRed Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64\n\n3. Description:\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux. \n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create Bash functions as environment variables\nneed to be made aware of the changes to the way names are handled by this\nupdate. For more information see the Knowledgebase article at\nhttps://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes. \n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article. \n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata \nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)\n\n6. Package List:\n\nRed Hat Enterprise Linux AS (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nia64:\nbash-3.0-27.el4.4.i386.rpm\nbash-3.0-27.el4.4.ia64.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.ia64.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux ES (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux LL (v. 5.6 server):\n\nSource:\nbash-3.2-24.el5_6.2.src.rpm\n\ni386:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\n\nia64:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-3.2-24.el5_6.2.ia64.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.ia64.rpm\n\nx86_64:\nbash-3.2-24.el5_6.2.x86_64.rpm\nbash-debuginfo-3.2-24.el5_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux EUS (v. 5.9 server):\n\nSource:\nbash-3.2-32.el5_9.3.src.rpm\n\ni386:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\n\nia64:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-3.2-32.el5_9.3.ia64.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.ia64.rpm\n\nppc:\nbash-3.2-32.el5_9.3.ppc.rpm\nbash-debuginfo-3.2-32.el5_9.3.ppc.rpm\n\ns390x:\nbash-3.2-32.el5_9.3.s390x.rpm\nbash-debuginfo-3.2-32.el5_9.3.s390x.rpm\n\nx86_64:\nbash-3.2-32.el5_9.3.x86_64.rpm\nbash-debuginfo-3.2-32.el5_9.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux AUS (v. 6.2 server):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-4.1.2-9.el6_2.2.x86_64.rpm\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-4.1.2-15.el6_4.2.i686.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-4.1.2-15.el6_4.2.ppc64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-4.1.2-15.el6_4.2.s390x.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\nbash-doc-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\nbash-doc-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\nbash-doc-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\nbash-doc-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-7169.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7186.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7187.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1200223\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUJau9XlSAg2UNWIIRAhKkAKC931kAxA4S4exwT4uGhDr7uDFIKQCglKKS\nN0AJiOto/RXwBqHtbfr1wkM=\n=SeAK\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Summary\n\n VMware product updates address Bash security vulnerabilities. Relevant Releases (Affected products for which remediation is present)\n\n vCenter Log Insight 2.0\n\n3. Problem Description \n\n a. Bash update for multiple products. \n\n Bash libraries have been updated in multiple products to resolve \n multiple critical security issues, also referred to as Shellshock. \n \n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifiers CVE-2014-6271, CVE-2014-7169, \n CVE-2014-7186, and CVE-2014-7187 to these issues. \n\n VMware products have been grouped into the following four\n product categories:\n \n I) ESXi and ESX Hypervisor\n ESXi is not affected because ESXi uses the Ash shell (through\n busybox), which is not affected by the vulnerability reported\n for the Bash shell. See table 1 for\n remediation for ESX. \n \n II) Windows-based products\n Windows-based products, including all versions of vCenter Server \n running on Windows, are not affected. \n\n III) VMware (virtual) appliances\n VMware (virtual) appliances ship with an affected version of Bash. \n See table 2 for remediation for appliances. \n \n IV) Products that run on Linux, Android, OSX or iOS (excluding\nvirtual\n appliances)\n\n Products that run on Linux, Android, OSX or iOS (excluding \n virtual appliances) might use the Bash shell that is part of the\n operating system. VMware recommends that customers\n contact their operating system vendor for a patch. \n \n MITIGATIONS\n\n VMware encourages restricting access to appliances through\n firewall rules and other network layer controls to only trusted IP\n addresses. This measure will greatly reduce any risk to these\n appliances. \n\n RECOMMENDATIONS\n\n VMware recommends customers evaluate and deploy patches for\n affected products in Table 1 and 2 below as these\n patches become available. \n\n Column 4 of the following tables lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n Table 1 - ESXi and ESX Hypervisor\n =================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n ESXi any ESXi Not affected\n\n ESX 4.1 ESX Patch pending *\n\n ESX 4.0 ESX Patch pending *\n\n * VMware will make VMware ESX 4.0 and 4.1 security patches available \n for the Bash shell vulnerability. This security patch release is an \n exception to the existing VMware lifecycle policy. \n\n Table 2 - Products that are shipped as a (virtual) appliance. \n =============================================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n \n vCenter Server Appliance 5.x Linux Patch Pending\n Horizon DaaS Platform 6.x Linux Patch Pending\n Horizon Workspace 1.x, 2.x Linux Patch Pending\n IT Business Management Suite 1.x Linux Patch Pending\n NSX for Multi-Hypervisor 4.x Linux Patch Pending\n NSX for vSphere 6.x Linux Patch Pending\n NVP 3.x Linux Patch Pending\n vCenter Converter Standalone 5.x Linux Patch Pending \n vCenter Hyperic Server 5.x Linux Patch Pending\n vCenter Infrastructure Navigator 5.x Linux Patch Pending\n vCenter Log Insight 1.x, 2.x Linux 2.0 U1\n vCenter Operations Manager 5.x Linux Patch Pending\n vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending\n vCenter Site Recovery Manager 5.x Linux Patch Pending\n**\n vCenter Support Assistant 5.x Linux Patch Pending\n vCloud Automation Center 6.x Linux Patch Pending\n vCloud Automation Center\n Application Services 6.x Linux Patch Pending\n vCloud Director Appliance 5.x Linux Patch Pending\n vCloud Connector 2.x Linux Patch Pending\n vCloud Networking and Security 5.x Linux Patch Pending\n vCloud Usage Meter 3.x Linux Patch Pending\n vFabric Application Director 5.x, 6.x Linux Patch Pending\n vFabric Postgres 9.x Linux Patch Pending\n Viewplanner 3.x Linux Patch Pending\n VMware Application Dependency \n Planner x.x Linux Patch Pending\n VMware Data Recovery 2.x Linux Patch Pending\n VMware HealthAnalyzer 5.x Linux Patch Pending\n VMware Mirage Gateway 5.x Linux Patch Pending\n VMware Socialcast On Premise x.x Linux Patch Pending\n VMware Studio 2.x Linux Patch Pending\n VMware TAM Data Manager x.x Linux Patch Pending\n VMware Workbench 3.x Linux Patch Pending\n vSphere App HA 1.x Linux Patch Pending\n vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending\n vSphere Data Protection 5.x Linux Patch Pending\n vSphere Management Assistant 5.x Linux Patch Pending\n vSphere Replication 5.x Linux Patch Pending\n vSphere Storage Appliance 5.x Linux Patch Pending\n\n ** This product includes Virtual Appliances that will be updated, the\nproduct \n itself is not a Virtual Appliance. Solution\n\n vCenter Log Insight\n ----------------------------\n Downloads:\n https://www.vmware.com/go/download-vcenter-log-insight\n (click Go to Downloads)\n Documentation:\n http://kb.vmware.com/kb/2091065\n\n5. References\n \n VMware Knowledge Base Article 2090740\n http://kb.vmware.com/kb/2090740\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\n\n- ------------------------------------------------------------------------\n\n6. Change Log\n\n 2014-09-30 VMSA-2014-0010\n Initial security advisory in conjunction with the release of\n vCenter Log Insight 2.0 U1 on 2014-09-30. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Policy\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2014 VMware Inc. All rights reserved. \n\nRelease Date: 2014-10-16\nLast Updated: 2014-10-16\n\nPotential Security Impact: Remote unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP\nStoreOnce Backup systems running Bash Shell. However, HP is unaware of any method that would\nallow this vulnerability to be exploited on HP StoreOnce Backup systems but\nis providing an updated version of Bash Shell as a precaution. \n\nReferences:\n\n CVE-2014-7169\n CVE-2014-6271\n CVE-2014-7187\n CVE-2014-7186\n SSRT101749\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP StoreOnce Backup software versions 3.0.0 to 3.11.3. \n\nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nHP has made the following updates available to resolve the vulnerability in\nHP StoreOnce Backup systems running Bash Shell. \n\n HP StoreOnce Backup version 3.11.4 for the following products:\n\n Product SKU\n Product Name\n\n BB896A\n HP StoreOnce 6500 Backup\n\n EJ022A\n HP StoreOnce B6200 Backup\n\n BB903A\n HP StoreOnce 4900 Backup\n\n BB877A\n HP StoreOnce 2700 Backup\n\n BB878A\n HP StoreOnce 4500 Backup\n\n BB879A\n HP StoreOnce 4700 Backup\n\n HP StoreOnce 2610 iSCSI Backup system\n\n BB852A\n HP StoreOnce 2620 iSCSI Backup system\n\n BB853A\n HP StoreOnce 4210 iSCSI Backup system\n\n BB854A\n HP StoreOnce 4210 FC Backup system\n\n BB855A\n HP StoreOnce 4220 Backup system\n\n BB856A\n HP StoreOnce 4420 Backup system\n\n BB857A\n HP StoreOnce 4430 Backup system\n\n TC458A/AAE\n HP StoreOnce VSA 10 TB 3 Year Software\n\n D4T77A/AAE\n HP StoreOnce VSA 4 TB 3 Year Software\n\nHISTORY\nVersion:1 (rev.1) - 16 October 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Relevant releases/architectures:\n\nSJIS (v. \n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login. \nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted", "sources": [ { "db": "NVD", "id": "CVE-2014-7187" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70154" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "128752" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128755" }, { "db": "PACKETSTORM", "id": "129132" } ], "trust": 4.5 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=36933", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7187" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-7187", "trust": 5.6 }, { "db": "CERT/CC", "id": "VU#252743", "trust": 2.8 }, { "db": "JVN", "id": "JVN55667175", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2014-000126", "trust": 2.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/28/10", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/26/2", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/25/32", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU97219505", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU97220341", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2014-004433", "trust": 1.6 }, { "db": "MCAFEE", "id": "SB10085", "trust": 1.4 }, { "db": "JUNIPER", "id": "JSA10648", "trust": 1.4 }, { "db": "PACKETSTORM", "id": "128517", "trust": 1.2 }, { "db": "SECUNIA", "id": "61065", "trust": 1.1 }, { "db": "SECUNIA", "id": "61622", "trust": 1.1 }, { "db": "SECUNIA", "id": "61603", "trust": 1.1 }, { "db": "SECUNIA", "id": "61287", "trust": 1.1 }, { "db": "SECUNIA", "id": "61643", "trust": 1.1 }, { "db": "SECUNIA", "id": "61618", "trust": 1.1 }, { "db": "SECUNIA", "id": "60433", "trust": 1.1 }, { "db": "SECUNIA", "id": "61188", "trust": 1.1 }, { "db": "SECUNIA", "id": "61565", "trust": 1.1 }, { "db": "SECUNIA", "id": "61312", "trust": 1.1 }, { "db": "SECUNIA", "id": "61703", "trust": 1.1 }, { "db": "SECUNIA", "id": "61503", "trust": 1.1 }, { "db": "SECUNIA", "id": "61479", "trust": 1.1 }, { "db": "SECUNIA", "id": "60034", "trust": 1.1 }, { "db": "SECUNIA", "id": "60044", "trust": 1.1 }, { "db": "SECUNIA", "id": "61328", "trust": 1.1 }, { "db": "SECUNIA", "id": "59907", "trust": 1.1 }, { "db": "SECUNIA", "id": "61129", "trust": 1.1 }, { "db": "SECUNIA", "id": "60024", "trust": 1.1 }, { "db": "SECUNIA", "id": "61633", "trust": 1.1 }, { "db": "SECUNIA", "id": "61128", "trust": 1.1 }, { "db": "SECUNIA", "id": "61313", "trust": 1.1 }, { "db": "SECUNIA", "id": "60055", "trust": 1.1 }, { "db": "SECUNIA", "id": "61855", "trust": 1.1 }, { "db": "SECUNIA", "id": "61291", "trust": 1.1 }, { "db": "SECUNIA", "id": "62343", "trust": 1.1 }, { "db": "SECUNIA", "id": "61641", "trust": 1.1 }, { "db": "SECUNIA", "id": "61857", "trust": 1.1 }, { "db": "SECUNIA", "id": "61816", "trust": 1.1 }, { "db": "SECUNIA", "id": "62312", "trust": 1.1 }, { "db": "SECUNIA", "id": "60193", "trust": 1.1 }, { "db": "SECUNIA", "id": "60063", "trust": 1.1 }, { "db": "SECUNIA", "id": "61873", "trust": 1.1 }, { "db": "SECUNIA", "id": "58200", "trust": 1.1 }, { "db": "SECUNIA", "id": "61636", "trust": 1.1 }, { "db": "SECUNIA", "id": "61654", "trust": 1.1 }, { "db": "SECUNIA", "id": "61550", "trust": 1.1 }, { "db": "SECUNIA", "id": "61283", "trust": 1.1 }, { "db": "SECUNIA", "id": "61485", "trust": 1.1 }, { "db": "SECUNIA", "id": "61442", "trust": 1.1 }, { "db": "SECUNIA", "id": "61552", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "128567", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU96447236", "trust": 0.8 }, { "db": "USCERT", "id": "TA14-268A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004431", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004476", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004399", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004410", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004432", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-14-269-01A", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-15-344-01", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201409-1073", "trust": 0.6 }, { "db": "BID", "id": "70154", "trust": 0.4 }, { "db": "JUNIPER", "id": "JSA10661", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "36933", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-7187", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130988", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128864", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128752", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128666", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129132", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129264", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128763", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129095", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130335", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128456", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128755", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "BID", "id": "70154" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "128752" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128755" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "id": "VAR-201409-1148", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4019157454999999 }, "last_update_date": "2024-07-23T20:33:04.791000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NAS-201410-05", "trust": 1.6, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "title": "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html" }, { "title": "APPLE-SA-2015-01-27-4", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html" }, { "title": "HT205267", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205267" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/en-us/ht204244" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/ja-jp/ht204244" }, { "title": "HT205267", "trust": 0.8, "url": "http://support.apple.com/ja-jp/ht205267" }, { "title": "bash-3.2-33.AXS3.4", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3918" }, { "title": "bash-4.1.2-15.AXS4.2", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3919" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash" }, { "title": "CTX200223", "trust": 0.8, "url": "https://support.citrix.com/article/ctx200223" }, { "title": "CTX200217", "trust": 0.8, "url": "https://support.citrix.com/article/ctx200217" }, { "title": "GNU Bash", "trust": 0.8, "url": "http://www.gnu.org/software/bash/" }, { "title": "HPSBMU03143 SSRT101761", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04479536" }, { "title": "HPSBMU03144 SSRT101762", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04479492" }, { "title": "HPSBMU03182 SSRT101787", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04497042" }, { "title": "HPSBHF03125 SSRT101724", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04471538" }, { "title": "HPSBST03131 SSRT101749", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04477872" }, { "title": "HPSBST03154 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04487558" }, { "title": "HPSBGN03233", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04540692" }, { "title": "HPSBGN03138 SSRT101755", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04475942" }, { "title": "HPSBST03129 SSRT101760", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04478866" }, { "title": "HPSBST03181 SSRT101811", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04496383" }, { "title": "HPSBMU03217 SSRT101827", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04512907" }, { "title": "HPSBGN03142 SSRT101764", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04479402" }, { "title": "HPSBMU03165 SSRT101783", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04497075" }, { "title": "HPSBMU03236 SSRT101830", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04552143" }, { "title": "HPSBGN03141 SSRT101763", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04479398" }, { "title": "HPSBST03157 SSRT101718", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04488200" }, { "title": "HPSBST03155 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04487573" }, { "title": "HPSBMU03245 SSRT101742", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04556845" }, { "title": "HPSBST03148 SSRT101749", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04479974" }, { "title": "HPSBMU03246 SSRT101743", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04558068" }, { "title": "1685541", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "title": "1685604", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "title": "S1004915", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915" }, { "title": "1685733", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "title": "T1021272", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272" }, { "title": "1686131", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "title": "S1004879", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "title": "MIGR-5096315", "trust": 0.8, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315" }, { "title": "S1004897", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897" }, { "title": "1685749", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "title": "S1004898", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898" }, { "title": "1685433", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685433" }, { "title": "1685914", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "title": "1686479", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "title": "1685522", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685522" }, { "title": "T1021279", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279" }, { "title": "1686447", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "title": "1686084", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "title": "1686493", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686493" }, { "title": "1685798", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685798" }, { "title": "1686299", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686299" }, { "title": "1686635", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686635" }, { "title": "\u30a2\u30e9\u30a4\u30c9\u30c6\u30ec\u30b7\u30b9\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831", "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97219505/522154/index.html" }, { "title": "ZENworks Configuration Management vulnerability with GNU Bash Remote Code Execution (aka ShellShock)", "trust": 0.8, "url": "https://www.novell.com/support/kb/doc.php?id=7015721" }, { "title": "OES11 SP2, OES11SP1, OES2 SP3 vulnerability with GNU Bash Remote Code Execution (aka ShellShock) and Mozilla NSS vulnerabilities", "trust": 0.8, "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "title": "AV14-003", "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "title": "Bash \"Shellshock\" Vulnerabilities - CVE-2014-7169", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "title": "Bug 1141597", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "title": "Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169) in Red Hat Enterprise Linux", "trust": 0.8, "url": "https://access.redhat.com/solutions/1207723" }, { "title": "RHSA-2014:1354", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2014-1354.html" }, { "title": "RHSA-2014:1306", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2014-1306.html" }, { "title": "Bash specially-crafted environment variables code injection attack", "trust": 0.8, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "title": "GNU Bash \u300cOS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u300d\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu252743.html" }, { "title": "SA82", "trust": 0.8, "url": "https://bto.bluecoat.com/security-advisory/sa82" }, { "title": "SOL15629", "trust": 0.8, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "title": "Multiple vulnerabilities in Bash", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash" }, { "title": "JSA10648", "trust": 0.8, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648" }, { "title": "VMSA-2014-0010", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html" }, { "title": "GNU bash \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.iodata.jp/support/information/2014/bash/" }, { "title": "bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169 \u4ed6)\u306b\u3088\u308bHA8500\u3078\u306e\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_ha8500.html" }, { "title": "\u30b5\u30fc\u30d0\u30fb\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u88fd\u54c1 bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169\u4ed6)\u306b\u3088\u308b\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_cve20146271.html" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/112/1126/1126247_cisco-sa-20140926-bash-j.html" }, { "title": "TLSA-2014-9", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2014/tlsa-2014-9j.html" }, { "title": "GNU Bash\u306b\u304a\u3051\u308bOS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://buffalo.jp/support_s/s20141002.html" }, { "title": "GNU Bash \u306b OS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/jvn-97219505.html" }, { "title": "bash4.1.2-15.el6_5.2.x86_64", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54163" }, { "title": "bash-4.2-cve-2014-7169-2", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54162" }, { "title": "Ubuntu Security Notice: bash vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2364-1" }, { "title": "Red Hat: CVE-2014-7187", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2014-7187" }, { "title": "Amazon Linux AMI: ALAS-2014-419", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2014-419" }, { "title": "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=86cb6b3955e100fdc9667a7ca916c772" }, { "title": "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=2b57ceaadfde2a8b03482273e1fd21ea" }, { "title": "Apple: OS X Yosemite v10.10.2 and Security Update 2015-001", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=64cbe709a7be49c91d8a8b0f43621640" }, { "title": "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash \u0027Shellshock\u0027 Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=tns-2014-07" }, { "title": "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=64ae0aae8269062686789e3a3fa1d2bf" }, { "title": "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=73443a6db89dc66fc6bcb49f85bfd1ab" }, { "title": "Apple: OS X El Capitan v10.11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=e88bab658248444f5dffc23fd95859e7" }, { "title": "Shell-Shock-Update", "trust": 0.1, "url": "https://github.com/umdterps/shell-shock-update " }, { "title": "fabric-shellshock", "trust": 0.1, "url": "https://github.com/ericlake/fabric-shellshock " }, { "title": "dokku-alt", "trust": 0.1, "url": "https://github.com/dokku-alt/dokku-alt " }, { "title": "patch-bash-shellshock", "trust": 0.1, "url": "https://github.com/jdauphant/patch-bash-shellshock " }, { "title": "w-test", "trust": 0.1, "url": "https://github.com/inspirion87/w-test " }, { "title": "linux-pentest", "trust": 0.1, "url": "https://github.com/ankh2054/linux-pentest " }, { "title": "shocktrooper", "trust": 0.1, "url": "https://github.com/evank/shocktrooper " }, { "title": "ShellShockHunter", "trust": 0.1, "url": "https://github.com/mrcl0wnlab/shellshockhunter " }, { "title": "shellshockFixOSX", "trust": 0.1, "url": "https://github.com/opragel/shellshockfixosx " }, { "title": "Xpl-SHELLSHOCK-Ch3ck", "trust": 0.1, "url": "https://github.com/googleinurl/xpl-shellshock-ch3ck " }, { "title": "bashcheck", "trust": 0.1, "url": "https://github.com/hannob/bashcheck " }, { "title": "shellshocker-pocs", "trust": 0.1, "url": "https://github.com/mubix/shellshocker-pocs " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/vmware-begins-to-patch-bash-issues-across-product-line/108632/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 }, { "problemtype": "OS Command injection (CWE-78) [IPA evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "trust": 2.5, "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "trust": 2.2, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash" }, { "trust": 2.2, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10085" }, { "trust": 1.9, "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa82" }, { "trust": 1.9, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/252743" }, { "trust": 1.6, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "trust": 1.6, "url": "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html" }, { "trust": 1.6, "url": "http://jvn.jp/jp/jvn55667175/index.html" }, { "trust": 1.6, "url": "http://jvn.jp/vu/jvnvu97219505/index.html" }, { "trust": 1.6, "url": "http://jvn.jp/vu/jvnvu97220341/index.html" }, { "trust": 1.6, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7187" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2014-1311.html" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2014-1312.html" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "trust": 1.4, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272" }, { "trust": 1.4, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897" }, { "trust": 1.4, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7169" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187" }, { "trust": 1.1, "url": "https://www.suse.com/support/shellshock/" }, { "trust": 1.1, "url": "http://support.novell.com/security/cve/cve-2014-7187.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61479" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61641" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61618" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61622" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61636" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2364-1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61485" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59907" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61654" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html" }, { "trust": 1.1, "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61565" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61643" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61503" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61633" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61552" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61703" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2014/oct/0" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61283" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61603" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61188" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200217" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60034" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61816" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61128" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61313" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61442" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61287" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200223" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60055" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61129" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "trust": 1.1, "url": "http://secunia.com/advisories/58200" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61328" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61857" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60193" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61065" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61550" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61855" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61312" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60063" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61291" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60044" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "trust": 1.1, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityalerts" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60433" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60024" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "trust": 1.1, "url": "http://jvn.jp/en/jp/jvn55667175/index.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "trust": 1.1, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "trust": 1.1, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2014-1354.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61873" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62343" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62312" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html" }, { "trust": 1.1, "url": "http://support.apple.com/ht204244" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht205267" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04518183" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04497075" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "trust": 1.0, "url": "https://access.redhat.com/articles/1200223" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6271" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7187" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.9, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/650" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/688" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/685" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 0.8, "url": "https://gist.github.com/anonymous/929d622f3b36b00c0be1" }, { "trust": 0.8, "url": "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html" }, { "trust": 0.8, "url": "https://shellshocker.net/#" }, { "trust": 0.8, "url": "http://support.apple.com/kb/ht6495" }, { "trust": 0.8, "url": "https://www.barracuda.com/support/techalerts" }, { "trust": 0.8, "url": "http://www.checkpoint.com/blog/protecting-shellshock/index.html" }, { "trust": 0.8, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044" }, { "trust": 0.8, "url": "https://www.debian.org/security/2014/dsa-3032" }, { "trust": 0.8, "url": "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf" }, { "trust": 0.8, "url": "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/" }, { "trust": 0.8, "url": "http://www.fortiguard.com/advisory/fg-ir-14-030/" }, { "trust": 0.8, "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml" }, { "trust": 0.8, "url": "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0" }, { "trust": 0.8, "url": "http://kb.juniper.net/jsa10648" }, { "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "trust": 0.8, "url": "http://support.novell.com/security/cve/cve-2014-6271.html" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc.php?id=7015702" }, { "trust": 0.8, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.522193" }, { "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2362-1/" }, { "trust": 0.8, "url": "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us\u0026cmd=displaykc\u0026externalid=2090740" }, { "trust": 0.8, "url": "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2014/at140037.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96447236/index.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000126.html" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta14-268a" }, { "trust": 0.8, "url": "http://www.aratana.jp/security/detail.php?id=10" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.jp/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004399.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004410.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004431.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004476.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004432.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004433.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7169" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6277" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6278" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7186" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-344-01" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6278" }, { "trust": 0.3, "url": "http://www.gnu.org/software/bash/" }, { "trust": 0.3, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673" }, { "trust": 0.3, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=kb83017" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2014/q3/735" }, { "trust": 0.3, "url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_c" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss" }, { "trust": 0.3, "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004932" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686433" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=isg3t1021361" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686494" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686445" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004903" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004928" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004911" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686479" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04497075" }, { "trust": 0.3, "url": "http://seclists.org/fulldisclosure/2014/oct/25" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04552143" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10661\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183066" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183009" }, { "trust": 0.3, "url": "https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00000.html" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paps5" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183222" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479398" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479402" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479492" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475942" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04488200" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04478866" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04477872" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479536" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692" }, { "trust": 0.3, "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471546" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471538" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04497042" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512907 " }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/76" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04558068" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/77" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04479974" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487558" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487573" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04496383" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paptm" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-9paptz" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/1a2e5-5116a33c2fb27/cert_security_mini-_bulletin_xrx15k_for_77xx_r15-03_v1.0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2eeef-51056e459c6d8/cert_security_mini-_bulletin_xrx15h_for_p7800_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2a901-510567b876a35/cert_security_mini-_bulletin_xrx15g_for_p6700_v1_0.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/1a7a1-50f12e334b734/cert_security_mini-_bulletin_xrx14h_for_wc59xx_v1.pdf" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2014-1306.html" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-377648.htm" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686447" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004982" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685873" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686132" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096533" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686024" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686037" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685733" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686171" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686098" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685875" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020272" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685541" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004905" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685673" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687971" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685691" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004933" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096503" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004945" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100183088" }, { "trust": 0.3, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2014-7187" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6277" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6278" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/70154" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35861" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2364-1/" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/36933/" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-7169" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-1865.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-7186" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/km01194258" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-7169.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-7186.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-7187.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7169" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vcenter-log-insight" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2091065" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2090740" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7186" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "BID", "id": "70154" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "128752" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128755" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-7187" }, { "db": "BID", "id": "70154" }, { "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "128864" }, { "db": "PACKETSTORM", "id": "128752" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "129264" }, { "db": "PACKETSTORM", "id": "128763" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "PACKETSTORM", "id": "128517" }, { "db": "PACKETSTORM", "id": "128755" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "db": "NVD", "id": "CVE-2014-7187" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-09-25T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2014-09-28T00:00:00", "db": "VULMON", "id": "CVE-2014-7187" }, { "date": "2014-09-25T00:00:00", "db": "BID", "id": "70154" }, { "date": "2014-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "date": "2014-10-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "date": "2015-03-24T17:07:02", "db": "PACKETSTORM", "id": "130988" }, { "date": "2014-10-27T23:44:00", "db": "PACKETSTORM", "id": "128864" }, { "date": "2014-10-20T13:14:00", "db": "PACKETSTORM", "id": "128752" }, { "date": "2014-10-14T23:07:16", "db": "PACKETSTORM", "id": "128666" }, { "date": "2014-11-17T23:31:07", "db": "PACKETSTORM", "id": "129132" }, { "date": "2014-11-26T15:07:58", "db": "PACKETSTORM", "id": "129264" }, { "date": "2014-10-20T17:55:00", "db": "PACKETSTORM", "id": "128763" }, { "date": "2014-11-13T17:15:31", "db": "PACKETSTORM", "id": "129095" }, { "date": "2015-02-10T17:43:19", "db": "PACKETSTORM", "id": "130335" }, { "date": "2014-09-27T16:45:44", "db": "PACKETSTORM", "id": "128456" }, { "date": "2014-10-01T22:22:00", "db": "PACKETSTORM", "id": "128517" }, { "date": "2014-10-20T14:02:00", "db": "PACKETSTORM", "id": "128755" }, { "date": "2014-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "date": "2014-09-28T19:55:06.270000", "db": "NVD", "id": "CVE-2014-7187" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-14T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2018-10-09T00:00:00", "db": "VULMON", "id": "CVE-2014-7187" }, { "date": "2015-11-03T19:52:00", "db": "BID", "id": "70154" }, { "date": "2015-12-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004433" }, { "date": "2024-07-18T02:27:00", "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "date": "2014-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1073" }, { "date": "2018-10-09T19:52:54.273000", "db": "NVD", "id": "CVE-2014-7187" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "129132" }, { "db": "PACKETSTORM", "id": "128456" }, { "db": "CNNVD", "id": "CNNVD-201409-1073" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GNU Bash shell executes commands in exported functions in environment variables", "sources": [ { "db": "CERT/CC", "id": "VU#252743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201409-1073" } ], "trust": 0.6 } }
gsd-2014-7187
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-7187", "description": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", "id": "GSD-2014-7187", "references": [ "https://www.suse.com/security/cve/CVE-2014-7187.html", "https://access.redhat.com/errata/RHSA-2014:1865", "https://access.redhat.com/errata/RHSA-2014:1354", "https://access.redhat.com/errata/RHSA-2014:1312", "https://access.redhat.com/errata/RHSA-2014:1311", "https://access.redhat.com/errata/RHSA-2014:1306", "https://ubuntu.com/security/CVE-2014-7187", "https://advisories.mageia.org/CVE-2014-7187.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-7187.html", "https://linux.oracle.com/cve/CVE-2014-7187.html", "https://packetstormsecurity.com/files/cve/CVE-2014-7187" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-7187" ], "details": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", "id": "GSD-2014-7187", "modified": "2023-12-13T01:22:47.330410Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7187.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61857" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7187" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "tags": [], "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7187.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "name": "61479", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61479" }, { "name": "61641", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61641" }, { "name": "61618", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61618" }, { "name": "61622", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61622" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "tags": [], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "61636", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61636" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "61485", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61485" }, { "name": "59907", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59907" }, { "name": "61654", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "tags": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "61565", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61565" }, { "name": "61643", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61643" }, { "name": "61503", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61503" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "tags": [], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "61633", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61633" }, { "name": "61552", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61552" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "61703", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61703" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "61283", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61283" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "61603", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61603" }, { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "HPSBGN03138", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61188", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61188" }, { "name": "HPSBHF03125", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "name": "60034", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60034" }, { "name": "61816", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61816" }, { "name": "61128", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61128" }, { "name": "61313", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61313" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "61442", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61442" }, { "name": "61287", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61287" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "60055", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60055" }, { "name": "61129", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61129" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "tags": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "58200", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58200" }, { "name": "61328", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61328" }, { "name": "61857", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61857" }, { "name": "60193", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60193" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "61065", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61065" }, { "name": "61550", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61550" }, { "name": "61855", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61855" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "61312", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61312" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "60063", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60063" }, { "name": "61291", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61291" }, { "name": "60044", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60044" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "tags": [], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "60433", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60433" }, { "name": "60024", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60024" }, { "name": "HPSBGN03141", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "HPSBGN03142", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "HPSBST03157", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "JVN#55667175", "refsource": "JVN", "tags": [], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "HPSBMU03144", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "HPSBST03131", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "tags": [], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBMU03143", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "tags": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "HPSBST03129", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "61873", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61873" }, { "name": "HPSBST03181", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "HPSBST03154", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "HPSBMU03165", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03148", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "62343", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62343" }, { "name": "62312", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62312" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBMU03245", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "HPSBMU03246", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "SSRT101830", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "HPSBMU03217", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205267" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-09T19:52Z", "publishedDate": "2014-09-28T19:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.