Vulnerability Details : CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Exploit prediction scoring system (EPSS) score for CVE-2015-2808
Probability of exploitation activity in the next 30 days: 0.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-2808
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-2808
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2808
-
http://www.securitytracker.com/id/1032707
HP Discovery & Dependency Mapping Inventory (DDMI) TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1032734
IBM Tivoli Directory Server Multiple Flaws Let Remote Authenticated Users Execute Arbitrary Commands, Remote Users Obtain Information and Conduct Cross-Site Scripting Attacks, and Local Users Obtain IThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
HPSBGN03352 rev.3 - HP Asset Manager Using RC4, Remote Disclosure of InformationThird Party Advisory
-
http://www.securitytracker.com/id/1032599
HP SiteScope TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2696-1
USN-2696-1: OpenJDK 7 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://marc.info/?l=bugtraq&m=144069189622016&w=2
'[security bulletin] HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information' - MARCIssue Tracking;Third Party Advisory
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
HPSBGN03350 rev.2 - HP SiteScope Using RC4, Remote Disclosure of InformationThird Party Advisory
-
http://www.debian.org/security/2015/dsa-3339
Debian -- Security Information -- DSA-3339-1 openjdk-6Third Party Advisory
-
http://www.securitytracker.com/id/1032600
HP Service Manager SSLv3 RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-1020.html
RHSA-2015:1020 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
[security-announce] SUSE-SU-2015:1319-1: important: Security update forMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1526.html
RHSA-2015:1526 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://marc.info/?l=bugtraq&m=144493176821532&w=2
'[security bulletin] HPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote Den' - MARCIssue Tracking;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=143629696317098&w=2
'[security bulletin] HPSBGN03354 rev.1 - HP Connect-IT Using RC4, Remote Disclosure of Information' - MARCIssue Tracking;Third Party Advisory
-
http://www.securitytracker.com/id/1033769
IBM Flex System Manager TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=144104533800819&w=2
'[security bulletin] HPSBMU03401 rev.1 - HP Operations Manager for UNIX and Linux, Remote Unauthorize' - MARCIssue Tracking;Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
Juniper Networks - 2016-04 Security Bulletin: Junos Space: Multiple privilege escalation vulnerabilities in Junos SpaceThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1091.html
RHSA-2015:1091 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM Flex System Manager (FSM) (CVE-2015-2808)Third Party Advisory
-
http://www.securitytracker.com/id/1036222
HPE Service Manager TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201512-10
Mozilla Products: Multiple vulnerabilities (GLSA 201512-10) — Gentoo securityThird Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
cpuapr2016v3Third Party Advisory
-
http://marc.info/?l=bugtraq&m=143741441012338&w=2
'[security bulletin] HPSBMU03377 rev.1 - HP Release Control running RC4, Remote Disclosure of Informa' - MARCIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/91787
Oracle July 2016 Critical Patch Update Multiple VulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1032990
HP Release Control TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Oracle Critical Patch Update - January 2018Patch;Third Party Advisory
-
http://www.securitytracker.com/id/1032708
HP Universal Configuration Management Database TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
Technical Description;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=144060606031437&w=2
'[security bulletin] HPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification, Di' - MARCIssue Tracking;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=143456209711959&w=2
'[security bulletin] HPSBGN03338 rev.1 - HP Service Manager running RC4, Remote Disclosure of Informa' - MARCIssue Tracking;Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
IBM IV71892: FIX SECURITY VULNERABILITY CVE-2015-2808Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPViewThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1007.html
RHSA-2015:1007 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1033072
HP Project and Portfolio Management Center TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
[security-announce] SUSE-SU-2015:1085-1: important: Security update forMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1033386
HP Network Node Manager i TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-1021.html
RHSA-2015:1021 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
HPSBGN03407 rev.1 - HP Operations Manager for Windows, Remote Unauthorized Modification, Disclosure of InformationThird Party Advisory
-
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
IBM Security Bulletin: Vulnerability in RC4 stream cipher affects Tivoli Netcool/OMNIbus (CVE-2015-2808)Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
McAfee Security Bulletin: Network Data Loss Prevention update fixes CVE-2015-2808 and CVE-2008-5161Broken Link
-
http://rhn.redhat.com/errata/RHSA-2015-1242.html
RHSA-2015:1242 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://marc.info/?l=bugtraq&m=143817899717054&w=2
'[security bulletin] HPSBGN03367 rev.1 - HP TransactionVision with RC4 Stream Cipher, Remote Disclosu' - MARCIssue Tracking;Third Party Advisory
-
http://www.securitytracker.com/id/1033432
HP Operations Manager for Windows TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2015/dsa-3316
Debian -- Security Information -- DSA-3316-1 openjdk-7Third Party Advisory
-
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Cognos Metrics Manager (CVE-2015-0478, CVE-2015-0488, CVE-2015-2808)Third Party Advisory
-
http://www.huawei.com/en/psirt/security-advisories/hw-454055
Security Advisory - Bar Mitzvah Attack Vulnerability in Huawei ProductsThird Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS)Third Party Advisory
-
http://www.securitytracker.com/id/1033431
HP Operations Manager for Linux and UNIX TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017Third Party Advisory
-
http://www.securitytracker.com/id/1032788
IBM Cognos Metrics Manager TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Oracle Critical Patch Update - July 2016Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1228.html
RHSA-2015:1228 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2706-1
USN-2706-1: OpenJDK 6 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
[security-announce] SUSE-SU-2015:1086-1: important: Security update forMailing List;Third Party Advisory
-
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
HPSBST03418 rev.2 - HP P6000 Command View Software, Remote Disclosure of InformationThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
[security-announce] SUSE-SU-2015:1320-1: important: Security update forMailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=144102017024820&w=2
'[security bulletin] HPSBGN03407 rev.1 - HP Operations Manager for Windows, Remote Unauthorized Modif' - MARCIssue Tracking;Third Party Advisory
-
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
Bar Mitzvah Attack in RC4 (CVE-2015-2808) - SecPod Blog
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
HPSBUX03512 SSRT102254 rev.2 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) and Other VulnerabilitiesThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1230.html
RHSA-2015:1230 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1032910
Oracle Java SE Multiple Flaws Lets Local and Remote Users Gain Elevated Privileges and Remote Users Partially Access Data, Modify Data, and Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
https://kb.juniper.net/JSA10783
Juniper Networks - 2017-04 Security Bulletin: Multiple Vulnerabilities in NorthStar Controller Application before version 2.1.0 Service Pack 1.Third Party Advisory
-
http://marc.info/?l=bugtraq&m=143817021313142&w=2
'[security bulletin] HPSBGN03372 rev.1 - HP Business Process Monitor using RC4, Remote Disclosure of ' - MARCIssue Tracking;Third Party Advisory
-
http://www.securitytracker.com/id/1033071
IBM Systems Director TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1033737
HP P6000 Command View TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-1243.html
RHSA-2015:1243 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
HPSBGN03580 rev.1 - HP Data Protector, Remote Code Execution, Remote Unauthorized Disclosure of InformationThird Party Advisory
-
http://marc.info/?l=bugtraq&m=144060576831314&w=2
'[security bulletin] HPSBGN03399 rev.1 - HP BSM Connector (BSMC), Remote Unauthorized Modification, D' - MARCIssue Tracking;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
[security-announce] SUSE-SU-2015:2192-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
[security-announce] SUSE-SU-2015:1138-1: important: Security update forMailing List;Third Party Advisory
-
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Netcool/OMNIbus (Multiple CVEs)Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Oracle Critical Patch Update - July 2015Third Party Advisory
-
http://www.securityfocus.com/bid/73684
SSL/TLS RC4 CVE-2015-2808 Information Disclosure WeaknessThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
HPSBGN03627 rev.1 - HPE Service Manager using OpenSSL, Remote Disclosure of InformationThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
[security-announce] openSUSE-SU-2015:1289-1: important: Security updateMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1032868
IBM Tivoli Netcool/OMNIbus TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1033415
HP Performance Manager TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-1229.html
RHSA-2015:1229 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://marc.info/?l=bugtraq&m=144104565600964&w=2
'[security bulletin] HPSBGN03403 rev.1 - HP Virtualization Performance Viewer, Remote Unauthorized Di' - MARCIssue Tracking;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
[security-announce] SUSE-SU-2015:2166-1: important: Security update forMailing List;Third Party Advisory
-
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
HP Support for Technical Help and Troubleshooting | HP® Customer Service.Third Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
HPSBGN03403 rev.1 - HP Virtualization Performance Viewer, Remote Unauthorized Disclosure of InformationThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
[security-announce] SUSE-SU-2015:1161-1: important: Security update forMailing List;Third Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
HPSBMU03345 rev.1 - HP Network Node Manager i (NNMi) and Smart Plugins (iSPIs) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information, Unauthorized ModificationThird Party Advisory
-
http://marc.info/?l=bugtraq&m=143818140118771&w=2
'[security bulletin] HPSBGN03366 rev.1 - HP Business Process Insight with RC4 Stream Cipher, Remote D' - MARCIssue Tracking;Third Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
HPSBMU03401 rev.1 - HP Operations Manager for UNIX and Linux, Remote Unauthorized Modification, Disclosure of InformationThird Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
HPSBHF03654 rev.1 - HPE iMC PLAT Network Products using SSL/TLS, Multiple Remote VulnerabilitiesThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1241.html
RHSA-2015:1241 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1032858
IBM Tivoli Netcool/OMNIbus TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTrackerThird Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=144059660127919&w=2
'[security bulletin] HPSBGN03414 rev.1 - HP Operations Agent, Remote Disclosure of Information' - MARCIssue Tracking;Third Party Advisory
-
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of InformationThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
[security-announce] SUSE-SU-2016:0113-1: important: Security update forMailing List;Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
IBM IV71888: FIX SECURITY VULNERABILITY CVE-2015-2808Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
[security-announce] openSUSE-SU-2015:1288-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
[security-announce] SUSE-SU-2015:1073-1: important:Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1006.html
RHSA-2015:1006 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://marc.info/?l=bugtraq&m=144059703728085&w=2
'[security bulletin] HPSBGN03415 rev.1 - HP Operations Agent Virtual Appliance, Remote Disclosure of ' - MARCIssue Tracking;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=144043644216842&w=2
'[security bulletin] HPSBMU03345 rev.1 - HP Network Node Manager i (NNMi) and Smart Plugins (iSPIs) f' - MARCIssue Tracking;Third Party Advisory
-
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
Security Advisory - Bar Mitzvah Attack Vulnerability in Huawei ProductsThird Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
HPSBHF03673 rev.1 - HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Multiple Remote VulnerabilitiesThird Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
IBM Security Bulletin: Multiple vulnerabilities in current releases of the IBM® SDK, Java™ Technology EditionThird Party Advisory
Products affected by CVE-2015-2808
- cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*
- Oracle » Integrated Lights Out Manager FirmwareVersions from including (>=) 3.0.0 and up to, including, (<=) 3.2.11cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*
- Oracle » Integrated Lights Out Manager FirmwareVersions from including (>=) 4.0.0 and up to, including, (<=) 4.0.4cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*
- Oracle » Communications Application Session ControllerVersions from including (>=) 3.0.0 and up to, including, (<=) 3.9.0cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*