Juan Ellis

  • info
  • discussion
  • exploit
  • solution
  • references
Multiple Huawei Products CVE-2016-8768 Local Privilege Escalation

Bugtraq ID: 93885
Class: Design Error
CVE: CVE-2016-8768
Remote: No
Local: Yes
Published: Oct 26 2016 12:00AM
Updated: Nov 25 2016 02:04PM
Credit: Zhao Jianqiang, Chen Gengjia, Wang Qize, Zhu Bin and Pan Yu.
Vulnerable: Huawei Honor 7 6.9
Huawei Honor 6 Plus 6.9
Huawei Honor 6 6.9
Not Vulnerable: Huawei Honor 7 6.9.16
Huawei Honor 6 Plus 6.9.16
Huawei Honor 6 6.9.16


SecurityFocus Vulnerabilities

Bugtraq ID: 58796 Class: Design Error CVE: CVE-2013-2566 Remote: Yes Local: No Published: Mar 12 2013 12:00AM Updated: Nov 24 2016 02:03PM Credit: Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar Vulnerable: Ubuntu Ubuntu Linux 13.10
Ubuntu Ubuntu Linux 13.04
Ubuntu Ubuntu Linux 12.10
Ubuntu Ubuntu Linux 12.04 LTS
Sun Glassfish Enterprise Server 3.1.1
Sun Glassfish Enterprise Server 3.0.1
Sun Glassfish Enterprise Server 2.1.1
Sun Glassfish Enterprise Server 2.1
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.37
Rsa RC4 0
Redhat JBoss Application Server 7.1.1
Redhat JBoss Application Server 6.1
Redhat JBoss Application Server 5.1
Redhat JBoss Application Server 5.0
Redhat JBoss Application Server 4.0.5
Redhat JBoss Application Server 4.0.4
Redhat JBoss Application Server 4.0.3
Redhat JBoss Application Server 3.2.2
Redhat JBoss Application Server 7.1.1.Final
Redhat JBoss Application Server 7.02
Redhat JBoss Application Server 7.0
Redhat JBoss Application Server 5.X
Redhat JBoss Application Server 5
Redhat JBoss Application Server 4.3
Redhat JBoss Application Server 4.2.3
Redhat JBoss Application Server 4.2
Oracle SPARC Enterprise M9000 XCP 1118
Oracle SPARC Enterprise M9000 XCP 1117
Oracle SPARC Enterprise M8000 XCP 1118
Oracle SPARC Enterprise M8000 XCP 1117
Oracle SPARC Enterprise M5000 XCP 1118
Oracle SPARC Enterprise M5000 XCP 1117
Oracle SPARC Enterprise M4000 XCP 1118
Oracle SPARC Enterprise M4000 XCP 1117
Oracle SPARC Enterprise M3000 XCP 1118
Oracle SPARC Enterprise M3000 XCP 1117
Oracle GlassFish 3.0.1
Oracle Fujitsu M10-4S Server XCP 2271
Oracle Fujitsu M10-4S Server XCP 2230
Oracle Fujitsu M10-4 Server XCP 2271
Oracle Fujitsu M10-4 Server XCP 2230
Oracle Fujitsu M10-1 Server XCP 2271
Oracle Fujitsu M10-1 Server XCP 2230
Oracle Enterprise Session Border Controller Ecz7.3m2p2
Opera Software Opera Web Browser 8.51
Opera Software Opera Web Browser 8.50
Opera Software Opera Web Browser 8.0.2
Opera Software Opera Web Browser 8.0 2
Opera Software Opera Web Browser 8.0 1
Opera Software Opera Web Browser 8.0
Opera Software Opera Web Browser 7.54
Opera Software Opera Web Browser 7.53
Opera Software Opera Web Browser 7.52
Opera Software Opera Web Browser 7.51
Opera Software Opera Web Browser 7.50
Opera Software Opera Web Browser 7.23
Opera Software Opera Web Browser 7.22
Opera Software Opera Web Browser 7.21
Opera Software Opera Web Browser 7.20 Beta 1 build 2981
Opera Software Opera Web Browser 7.20
Opera Software Opera Web Browser 7.11 j
Opera Software Opera Web Browser 7.11 b
Opera Software Opera Web Browser 7.11
Opera Software Opera Web Browser 7.10
Opera Software Opera Web Browser 7.0 win32 Beta 2
Opera Software Opera Web Browser 7.0 win32 Beta 1
Opera Software Opera Web Browser 7.0 win32
Opera Software Opera Web Browser 7.0 3win32
Opera Software Opera Web Browser 7.0 2win32
Opera Software Opera Web Browser 7.0 1win32
Opera Software Opera Web Browser 6.10 linux
Opera Software Opera Web Browser 6.0.5 win32
Opera Software Opera Web Browser 6.0.4 win32
Opera Software Opera Web Browser 6.0.3 win32
Opera Software Opera Web Browser 6.0.3 linux
Opera Software Opera Web Browser 6.0.2 win32
Opera Software Opera Web Browser 6.0.2 linux
Opera Software Opera Web Browser 6.0.1 win32
Opera Software Opera Web Browser 6.0.1 linux
Opera Software Opera Web Browser 6.0.1
Opera Software Opera Web Browser 6.0 win32
Opera Software Opera Web Browser 6.0 6
Opera Software Opera Web Browser 6.0 .6win32
Opera Software Opera Web Browser 6.0
Opera Software Opera Web Browser 5.12 win32
Opera Software Opera Web Browser 5.12
Opera Software Opera Web Browser 5.1 1 win32
Opera Software Opera Web Browser 5.1 0 win32
Opera Software Opera Web Browser 5.0 Linux
Opera Software Opera Web Browser 5.0 2 win32
Opera Software Opera Web Browser 5.0 Mac
Opera Software Opera Web Browser 9.64
Opera Software Opera Web Browser 9.63
Opera Software Opera Web Browser 9.62
Opera Software Opera Web Browser 9.61
Opera Software Opera Web Browser 9.60 beta 1
Opera Software Opera Web Browser 9.60
Opera Software Opera Web Browser 9.52
Opera Software Opera Web Browser 9.51
Opera Software Opera Web Browser 9.50 beta
Opera Software Opera Web Browser 9.5
Opera Software Opera Web Browser 9.27
Opera Software Opera Web Browser 9.26
Opera Software Opera Web Browser 9.25
Opera Software Opera Web Browser 9.24
Opera Software Opera Web Browser 9.23
Opera Software Opera Web Browser 9.22
Opera Software Opera Web Browser 9.21
Opera Software Opera Web Browser 9.20 beta 1
Opera Software Opera Web Browser 9.20
Opera Software Opera Web Browser 9.10
Opera Software Opera Web Browser 9.02
Opera Software Opera Web Browser 9.01
Opera Software Opera Web Browser 9
Opera Software Opera Web Browser 8.54
Opera Software Opera Web Browser 8.53
Opera Software Opera Web Browser 8.52
Opera Software Opera Web Browser 12.13
Opera Software Opera Web Browser 12.12
Opera Software Opera Web Browser 12.11
Opera Software Opera Web Browser 12.10
Opera Software Opera Web Browser 12.02
Opera Software Opera Web Browser 12.01
Opera Software Opera Web Browser 12.01
Opera Software Opera Web Browser 12.00
Opera Software Opera Web Browser 12
Opera Software Opera Web Browser 11.67
Opera Software Opera Web Browser 11.66
Opera Software Opera Web Browser 11.65
Opera Software Opera Web Browser 11.64
Opera Software Opera Web Browser 11.62
Opera Software Opera Web Browser 11.61
Opera Software Opera Web Browser 11.60
Opera Software Opera Web Browser 11.52
Opera Software Opera Web Browser 11.52
Opera Software Opera Web Browser 11.51
Opera Software Opera Web Browser 11.51
Opera Software Opera Web Browser 11.50
Opera Software Opera Web Browser 11.11
Opera Software Opera Web Browser 11.10
Opera Software Opera Web Browser 11.01
Opera Software Opera Web Browser 11.00
Opera Software Opera Web Browser 10.63
Opera Software Opera Web Browser 10.62
Opera Software Opera Web Browser 10.61
Opera Software Opera Web Browser 10.60
Opera Software Opera Web Browser 10.60
Opera Software Opera Web Browser 10.54
Opera Software Opera Web Browser 10.54
Opera Software Opera Web Browser 10.53
Opera Software Opera Web Browser 10.52
Opera Software Opera Web Browser 10.51
Opera Software Opera Web Browser 10.50
Opera Software Opera Web Browser 10.10
Opera Software Opera Web Browser 10.1
Opera Software Opera Web Browser 10.01
Opera Software Opera Web Browser 10.00
Opera Software Opera Web Browser 10
Mozilla SeaMonkey 2.16.1
Mozilla SeaMonkey 2.13.2
Mozilla SeaMonkey 2.22
Mozilla SeaMonkey 2.21
Mozilla SeaMonkey 2.20
Mozilla SeaMonkey 2.17
Mozilla SeaMonkey 2.16
Mozilla SeaMonkey 2.15
Mozilla SeaMonkey 2.14
Mozilla SeaMonkey 2.13.1
Mozilla SeaMonkey 2.13
Mozilla SeaMonkey 2.12
Mozilla SeaMonkey 2.11
Mozilla SeaMonkey 2.11
Mozilla SeaMonkey 2.10
Mozilla Firefox ESR 17.0.10
Mozilla Firefox ESR 17.0.9
Mozilla Firefox ESR 17.0.7
Mozilla Firefox ESR 17.0.6
Mozilla Firefox ESR 17.0.4
Mozilla Firefox ESR 17.0.3
Mozilla Firefox ESR 17.0.2
Mozilla Firefox ESR 17.0.1
Mozilla Firefox ESR 24.1
Mozilla Firefox ESR 17.0.8
Mozilla Firefox 19.0.2
Mozilla Firefox 16.0.2
Mozilla Firefox 16.0.1
Mozilla Firefox 15.0.1
Mozilla Firefox 25.0
Mozilla Firefox 24.0
Mozilla Firefox 23.0
Mozilla Firefox 22.0
Mozilla Firefox 21.0
Mozilla Firefox 20.0.1
Mozilla Firefox 20.0
Mozilla Firefox 19.0
Mozilla Firefox 18.0
Mozilla Firefox 17.0.1
Mozilla Firefox 17.0
Mozilla Firefox 16
Mozilla Firefox 15
Mozilla Firefox 14.01
Mozilla Firefox 14.0
Mozilla Firefox 14
Mozilla Firefox 13.0
Mozilla Firefox 12.0
Mozilla Firefox 11.0
Mozilla Firefox 10.0.2
Mozilla Firefox 10.0.1
Mozilla Firefox 10.0
Mozilla Firefox 10
Moonchild Productions Pale Moon 24.1.1
Moonchild Productions Pale Moon 24.1
Moonchild Productions Pale Moon 20.0.1
Moonchild Productions Pale Moon 24.0
Moonchild Productions Pale Moon 20.3
Moonchild Productions Pale Moon 20.2
Moonchild Productions Pale Moon 20.1
Microsoft Internet Explorer 7.0.5730 .11
Microsoft Internet Explorer 5.0.1 SP4
Microsoft Internet Explorer 5.0.1 SP3
Microsoft Internet Explorer 5.0.1 SP2
Microsoft Internet Explorer 5.0.1 SP1
Microsoft Internet Explorer 5.0.1 for Windows NT 4.0
Microsoft Internet Explorer 5.0.1 for Windows 98
Microsoft Internet Explorer 5.0.1 for Windows 95
Microsoft Internet Explorer 5.0.1 for Windows 2000
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 4.0.1 SP2
Microsoft Internet Explorer 4.0.1 for Windows NT 4.0
Microsoft Internet Explorer 4.0.1 for Windows 98
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 3.0.2 for Windows NT 4.0
Microsoft Internet Explorer 3.0.2 for Windows 95
Microsoft Internet Explorer 3.0.1 for Windows NT 4.0
Microsoft Internet Explorer 3.0.1 for Windows 95
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8.0.7600.16385
Microsoft Internet Explorer 8 RC1
Microsoft Internet Explorer 8 beta 2
Microsoft Internet Explorer 8 Beta 1
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7.0 beta3
Microsoft Internet Explorer 7.0 beta2
Microsoft Internet Explorer 7.0 beta1
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6.0 SP3
Microsoft Internet Explorer 6.0 SP2
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 5.5 SP1
Microsoft Internet Explorer 5.5 preview
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0 for Windows NT 4
Microsoft Internet Explorer 5.0 for Windows 98
Microsoft Internet Explorer 5.0 for Windows 95
Microsoft Internet Explorer 5.0 for Windows 2000
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.1 for Windows NT 4
Microsoft Internet Explorer 4.1 for Windows 98
Microsoft Internet Explorer 4.1 for Windows 95
Microsoft Internet Explorer 4.0 for Windows NT 4
Microsoft Internet Explorer 4.0 for Windows NT 3
Microsoft Internet Explorer 4.0 for Windows 98
Microsoft Internet Explorer 4.0 for Windows 95
Microsoft Internet Explorer 4.0 for Windows 3.1
Microsoft Internet Explorer 4.0 for WfW
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 3.2 for Windows NT 4
Microsoft Internet Explorer 3.2 for Windows NT 3
Microsoft Internet Explorer 3.2 for Windows 95
Microsoft Internet Explorer 3.2 for Windows 3.1
Microsoft Internet Explorer 3.2 for WfW
Microsoft Internet Explorer 3.0 for Windows NT 4
Microsoft Internet Explorer 3.0 for Windows NT 3
Microsoft Internet Explorer 3.0 for Windows 95
Microsoft Internet Explorer 3.0 for Windows 3.1
Microsoft Internet Explorer 3.0 for WfW
Microsoft Internet Explorer 10 For Windows 8
Microsoft Internet Explorer 10
Mandriva Business Server 1 X86 64
Mandriva Business Server 1
MandrakeSoft Enterprise Server 5 x86_64
MandrakeSoft Enterprise Server 5
IBM Websphere Application Server 8.0 2
IBM Websphere Application Server 7.0 3
IBM Websphere Application Server 7.0 29
IBM Websphere Application Server 7.0 21
IBM Websphere Application Server 7.0 .9
IBM Websphere Application Server 7.0 .8
IBM Websphere Application Server 7.0 .2
IBM Websphere Application Server 7.0 .13
IBM Websphere Application Server 7.0 .12
IBM Websphere Application Server 7.0 .11
IBM Websphere Application Server 6.1.2
IBM Websphere Application Server 6.1 41
IBM Websphere Application Server 6.1 .9
IBM Websphere Application Server 6.1 .8
IBM Websphere Application Server 6.1 .7
IBM Websphere Application Server 6.1 .6
IBM Websphere Application Server 6.1 .5
IBM Websphere Application Server 6.1 .4
IBM Websphere Application Server 6.1 .33
IBM Websphere Application Server 6.1 .32
IBM Websphere Application Server 6.1 .3
IBM Websphere Application Server 6.1 .25
IBM Websphere Application Server 6.1 .23
IBM Websphere Application Server 6.1 .22
IBM Websphere Application Server 6.1 .21
IBM Websphere Application Server 6.1 .20
IBM Websphere Application Server 6.1 .2
IBM Websphere Application Server 6.1 .19
IBM Websphere Application Server 6.1 .18
IBM Websphere Application Server 6.1 .17
IBM Websphere Application Server 6.1 .15
IBM Websphere Application Server 6.1 .14
IBM Websphere Application Server 6.1 .13
IBM Websphere Application Server 6.1 .12
IBM Websphere Application Server 6.1 .11
IBM Websphere Application Server 6.1 .10
IBM Websphere Application Server 6.1 .1
IBM Websphere Application Server 6.1
IBM Websphere Application Server 6.0.2 .9
IBM Websphere Application Server 6.0.2 .7
IBM Websphere Application Server 6.0.2 .5
IBM Websphere Application Server 6.0.2 .39
IBM Websphere Application Server 6.0.2 .35
IBM Websphere Application Server 6.0.2 .33
IBM Websphere Application Server 6.0.2 .31
IBM Websphere Application Server 6.0.2 .3
IBM Websphere Application Server 6.0.2 .29
IBM Websphere Application Server 6.0.2 .27
IBM Websphere Application Server 6.0.2 .25
IBM Websphere Application Server 6.0.2 .24
IBM Websphere Application Server 6.0.2 .23
IBM Websphere Application Server 6.0.2 .22
IBM Websphere Application Server 6.0.2 .21
IBM Websphere Application Server 6.0.2 .17
IBM Websphere Application Server 6.0.2 .15
IBM Websphere Application Server 6.0.2 .13
IBM Websphere Application Server 6.0.2 .11
IBM Websphere Application Server 6.0.2 .1
IBM Websphere Application Server 6.0.2
IBM Websphere Application Server 6.0.1
IBM Websphere Application Server 6.0 .7
IBM Websphere Application Server 6.0
IBM Websphere Application Server 5.1.1 .9
IBM Websphere Application Server 5.1.1 .8
IBM Websphere Application Server 5.1.1 .7
IBM Websphere Application Server 5.1.1 .6
IBM Websphere Application Server 5.1.1 .5
IBM Websphere Application Server 5.1.1 .4
IBM Websphere Application Server 5.1.1 .3
IBM Websphere Application Server 5.1.1 .2
IBM Websphere Application Server 5.1.1 .19
IBM Websphere Application Server 5.1.1 .18
IBM Websphere Application Server 5.1.1 .17
IBM Websphere Application Server 5.1.1 .16
IBM Websphere Application Server 5.1.1 .15
IBM Websphere Application Server 5.1.1 .14
IBM Websphere Application Server 5.1.1 .13
IBM Websphere Application Server 5.1.1 .12
IBM Websphere Application Server 5.1.1 .11
IBM Websphere Application Server 5.1.1 .10
IBM Websphere Application Server 5.1.1 .1
IBM Websphere Application Server 5.1.1
IBM Websphere Application Server 5.1 .0.5
IBM Websphere Application Server 5.1 .0.4
IBM Websphere Application Server 5.1 .0.3
IBM Websphere Application Server 5.1 .0.2
IBM Websphere Application Server 5.1
IBM Websphere Application Server 5.0.2 .9
IBM Websphere Application Server 5.0.2 .8
IBM Websphere Application Server 5.0.2 .7
IBM Websphere Application Server 5.0.2 .6
IBM Websphere Application Server 5.0.2 .5
IBM Websphere Application Server 5.0.2 .4
IBM Websphere Application Server 5.0.2 .3
IBM Websphere Application Server 5.0.2 .2
IBM Websphere Application Server 5.0.2 .16
IBM Websphere Application Server 5.0.2 .15
IBM Websphere Application Server 5.0.2 .14
IBM Websphere Application Server 5.0.2 .13
IBM Websphere Application Server 5.0.2 .12
IBM Websphere Application Server 5.0.2 .11
IBM Websphere Application Server 5.0.2 .10
IBM Websphere Application Server 5.0.2 .1
IBM Websphere Application Server 5.0.2
IBM Websphere Application Server 5.0.1
IBM Websphere Application Server 5.0
IBM Websphere Application Server 4.0.4
IBM Websphere Application Server 4.0.3
IBM Websphere Application Server 3.5.7
IBM Websphere Application Server 3.5.3
IBM Websphere Application Server 3.5.2
IBM Websphere Application Server 3.5.1
IBM Websphere Application Server 3.5
IBM Websphere Application Server 3.0.2 .1
IBM Websphere Application Server 3.0.2
IBM Websphere Application Server 3.0 .2.4
IBM Websphere Application Server 3.0 .2.3
IBM Websphere Application Server 3.0 .2.2
IBM Websphere Application Server 3.0
- IBM AIX 4.3
- Linux kernel 2.3 .x
- Microsoft Windows NT 4.0
- Novell Netware 5.0
- Sun Solaris 8_sparc
IBM Websphere Application Server 2.0
IBM Websphere Application Server 8.5.0.2
IBM Websphere Application Server 8.5.0.1
IBM Websphere Application Server 8.5.0.0
IBM Websphere Application Server 8.5
IBM Websphere Application Server 8.0.0.6
IBM Websphere Application Server 8.0.0.5
IBM Websphere Application Server 8.0.0.4
IBM Websphere Application Server 8.0.0.3
IBM Websphere Application Server 8.0.0.1
IBM Websphere Application Server 8.0.0.0
IBM Websphere Application Server 8.0
IBM Websphere Application Server 7.0.0.7
IBM Websphere Application Server 7.0.0.6
IBM Websphere Application Server 7.0.0.5
IBM Websphere Application Server 7.0.0.4
IBM Websphere Application Server 7.0.0.27
IBM Websphere Application Server 7.0.0.25
IBM Websphere Application Server 7.0.0.23
IBM Websphere Application Server 7.0.0.19
IBM Websphere Application Server 7.0.0.17
IBM Websphere Application Server 7.0.0.15
IBM Websphere Application Server 7.0.0.14
IBM Websphere Application Server 7.0.0.13
IBM Websphere Application Server 7.0.0.1
IBM Websphere Application Server 7.0.0.0
IBM Websphere Application Server 7.0
IBM Websphere Application Server 7
IBM Websphere Application Server 6.2
IBM Websphere Application Server 6.1.1.0
IBM Websphere Application Server 6.1.0.47
IBM Websphere Application Server 6.1.0.45
IBM Websphere Application Server 6.1.0.43
IBM Websphere Application Server 6.1.0.39
IBM Websphere Application Server 6.1.0.37
IBM Websphere Application Server 6.1.0.35
IBM Websphere Application Server 6.1.0.34
IBM Websphere Application Server 6.1.0.33
IBM Websphere Application Server 6.1.0.31
IBM Websphere Application Server 6.1.0.29
IBM Websphere Application Server 6.1.0.27
IBM Websphere Application Server 6.1
IBM Websphere Application Server 6.0.2.43
IBM Websphere Application Server 6.0.2.41
IBM Websphere Application Server 6.0.2.19
IBM Websphere Application Server 6.0.2 Fix Pack 17
IBM Websphere Application Server 1.0
IBM Security SiteProtector System 3.1.1
IBM Security SiteProtector System 3.1
IBM Security SiteProtector System 3.0
IBM ABYP-4TS-P-M 0
IBM ABYP-4TS-P 0
IBM ABYP-4TL-P-M 0
IBM ABYP-4TL-P 0
IBM ABYP-4T-0S-0L-P-M 0
IBM ABYP-4T-0S-0L-P 0
IBM ABYP-2T-2S-0L-P-M 0
IBM ABYP-2T-2S-0L-P 0
IBM ABYP-2T-1S-1L-P-M 0
IBM ABYP-2T-1S-1L-P 0
IBM ABYP-2T-0S-2L-P-M 0
IBM ABYP-2T-0S-2L-P 0
IBM ABYP-10G-4SR-1-P-M 0
IBM ABYP-10G-4SR-1-P 0
IBM ABYP-10G-4LR-1-P-M 0
IBM ABYP-10G-4LR-1-P 0
IBM ABYP-10G-2SR-2LR-1-P-M 0
IBM ABYP-10G-2SR-2LR-1-P 0
IBM ABYP-0T-4S-0L-P-M 0
IBM ABYP-0T-4S-0L-P 0
IBM ABYP-0T-2S-2L-P-M 0
IBM ABYP-0T-2S-2L-P 0
IBM ABYP-0T-0S-4L-P-M 0
IBM ABYP-0T-0S-4L-P 0
HP VSR (Comware 7) 0
HP U200S and CS (Comware 5) 0
HP U200A and M (Comware 5) 0
HP SMB1920 (Comware 5) R1106
HP SMB1910 (Comware 5) R1108
HP SMB 1620 (Comware 5) R1105
HP SecBlade FW (Comware 5) 0
HP MSR4000 (Comware 7) 0
HP MSR3000 (Comware 7) 0
HP MSR2000 (Comware 7) 0
HP MSR20-1X (Comware 5) 0
HP MSR20 (Comware 5) 0
HP MSR1000 (Comware 7) 0
HP MSR1000 (Comware 5) 0
HP MSR 9XX (Comware 5) 0
HP MSR 93X (Comware 5) 0
HP MSR 50-G2 (Comware 5) 0
HP MSR 30-1X (Comware 5) 0
HP MSR 30-16 (Comware 5) 0
HP MSR 30 (Comware 5) 0
HP Moonshot 0
HP JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU 0
HP JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU 0
HP JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU 0
HP JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU 0
HP JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU 0
HP JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU 0
HP JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU 0
HP JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU 0
HP JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU 0
HP JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU 0
HP JG546AAE HP IMC Basic SW Platform w/50-node E-LTU 0
HP JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU 0
HP JF378A HP IMC Ent S/W Platform w/200-node Lic 0
HP JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU 0
HP JF377A HP IMC Std S/W Platform w/100-node Lic 0
HP JF289AAE HP Enterprise Management System to Intelligent Manageme 0
HP JF288AAE HP Network Director to Intelligent Management Center 0
HP JD816A HP A-IMC Standard Edition Software DVD Media 0
HP JD815A HP IMC Std Platform w/100-node License 0
HP JD814A HP A-IMC Enterprise Edition Software DVD Media 0
HP JD808A HP IMC Ent Platform w/100-node License 0
HP JD126A HP IMC Ent S/W Platform w/100-node 0
HP JD125A HP IMC Std S/W Platform w/100-node 0
HP HSR6800 (Comware 7) 0
HP HSR6800 (Comware 5) 0
HP HSR6602 (Comware 5) 0
HP HP870 (Comware 5) 0
HP HP850 (Comware 5) 0
HP HP830 (Comware 5) 0
HP F5000-C/S (Comware 5) 0
HP F1000-E (Comware 5) 0
HP F1000-A-EI (Comware 5) 0
HP Business Service Automation Essentials Core 9.2
HP Business Service Automation Essentials Core 9.1
HP 9500E (Comware 5) 0
HP 7900 (Comware 7) R2122
HP 7500 (Comware 7) 0
HP 7500 (Comware 5) 0
HP 6600 RSE RU (Comware 5 Low Encryption SW) R3303P18
HP 6127XLG 0
HP 6125XLG 0
HP 5950 (Comware 7) 0
HP 5940 (Comware 7) 0
HP 5930 (Comware 7) 0
HP 5920 (Comware 7) 0
HP 5900 (Comware 7) 0
HP 5830 (Comware 5) 0
HP 5800 (Comware 5) 0
HP 5500SI (Comware 5) 0
HP 5500 HI (Comware 5) 0
HP 5500 EI (Comware 5) 0
HP 5130 (Comware 7) R3108P03
HP 5120 SI (Comware 5) 0
HP 5120 EI (Comware 5) 0
HP 4800G (Comware 5) 0
HP 4500G (Comware 5) 0
HP 4210G (Comware 5) 0
HP 12500 (Comware 7) 0
HP 12500 (Comware 5) 0
HP 10500 (Comware 7) 0
HP 10500 (Comware 5) 0
Hitachi Web Server - Security Enhancement 0
Hitachi Web Server 04-10-02 (Windows)
Hitachi Web Server 04-10-02 (Linux)
Hitachi Web Server 04-10-01 Linux (IPF)
Hitachi Web Server 04-10-01 (AIX)
Hitachi Web Server 04-10(Windows)
Hitachi Web Server 04-10 (Linux)
Hitachi Web Server 04-00.(Windows)
Hitachi Web Server 04-00-04 (Windows)
Hitachi Web Server 04-00-03.(Solaris)
Hitachi Web Server 04-00-03 (Linux)
Hitachi Web Server 04-00-02 (AIX)
Hitachi Web Server 04-00-01 (* 2).(Sola
Hitachi Web Server 04-00 Linux
Hitachi Web Server 04-00 (HP-UX (IPF))
Hitachi Web Server 04-00 (AIX)
Hitachi Web Server 03-10-04 (Linux)
Hitachi Web Server 03-10-03 (Windows)
Hitachi Web Server 03-10-02 (Linux(IPF)
Hitachi Web Server 03-10-01 (Windows)
Hitachi Web Server 03-10-01 (Linux)
Hitachi Web Server 03-10-01 (AIX)
Hitachi Web Server 03-10 (Windows)
Hitachi Web Server 03-10 (Solaris)
Hitachi Web Server 03-10 (Linux)
Hitachi Web Server 03-10 (Linux IPF)
Hitachi Web Server 03-10 (AIX)
Hitachi Web Server 03-00-2 (Windows)
Hitachi Web Server 03-00-05 (Windows)
Hitachi Web Server 03-00-05 (HP-UX)
Hitachi Web Server 03-00-05 (AIX)
Hitachi Web Server 03-00-04 (Windows)
Hitachi Web Server 03-00-03 (Windows)
Hitachi Web Server 03-00-02 (Windows)
Hitachi Web Server 03-00-02 (Linux)
Hitachi Web Server 03-00-02 (Linux IPF)
Hitachi Web Server 03-00-02 (AIX)
Hitachi Web Server 03-00-01(*2) (Linux)
Hitachi Web Server 03-00-01 (Windows)
Hitachi Web Server 03-00-01 (Solaris)
Hitachi Web Server 03-00-01 (Linux)
Hitachi Web Server 03-00-01 (Linux IPF)
Hitachi Web Server 03-00-01 (HP-UX)
Hitachi Web Server 03-00-01 (HP-UX IPF)
Hitachi Web Server 03-00-01 (HP-UX 11.0
Hitachi Web Server 03-00-01 (AIX)
Hitachi Web Server 03-00 (Windows)
Hitachi Web Server 03-00 (Solaris)
Hitachi Web Server 03-00 (Linux)
Hitachi Web Server 03-00 (Linux IPF)
Hitachi Web Server 03-00 (HP-UX)
Hitachi Web Server 03-00 (HP-UX IPF)
Hitachi Web Server 03-00 (HP-UX 11.0)
Hitachi Web Server 03-00 (AIX)
Hitachi Web Server 02-06-/F (Linux)
Hitachi Web Server 02-06-/B (Linux)
Hitachi Web Server 02-06-/A (Linux)
Hitachi Web Server 02-04/-E (AIX)
Hitachi Web Server 02-04-/F (Windows)
Hitachi Web Server 02-04-/F (Windows)
Hitachi Web Server 02-04-/F (Solaris)
Hitachi Web Server 02-04-/F (HP-UX)
Hitachi Web Server 02-04-/F (HP-UX IPF)
Hitachi Web Server 02-04-/F (AIX)
Hitachi Web Server 02-04-/E (Windows)
Hitachi Web Server 02-04-/E (HP-UX(IPF)
Hitachi Web Server 02-04-/E (HP-UX IPF)
Hitachi Web Server 02-04-/E (AIX)
Hitachi Web Server 02-04-/D (Windows)
Hitachi Web Server 02-04-/D (Linux(IPF)
Hitachi Web Server 02-04-/C (Solaris)
Hitachi Web Server 02-04-/C (Linux IPF)
Hitachi Web Server 02-04-/C (HP-UX)
Hitachi Web Server 02-04-/C (HP-UX IPF)
Hitachi Web Server 02-04-/C (AIX)
Hitachi Web Server 02-04-/B (Solaris)
Hitachi Web Server 02-04-/B (Linux(IPF)
Hitachi Web Server 02-04-/B (HP-UX)
Hitachi Web Server 02-04-/B (HP-UX IPF)
Hitachi Web Server 02-04-/B (HP-UX 11.0
Hitachi Web Server 02-04-/B (AIX)
Hitachi Web Server 02-04-/A(*2)(Windows
Hitachi Web Server 02-04-/A (Windows IP
Hitachi Web Server 02-03 (Windows IPF)
Hitachi Web Server 02-02 (Linux)
Hitachi Web Server 02-02 (Linux IPF)
Hitachi Web Server 02-02 (HP-UX(IPF))
Hitachi Web Server 02-02 (HP-UX IPF)
Hitachi Web Server 02-00/A(1*) (Linux)
Hitachi Web Server 02-00-/A (Linux)
Hitachi Web Server 02-00(*2) (Linux AP8
Hitachi Web Server 02-00 (Windows)
Hitachi Web Server 02-00 (Turbolinux)
Hitachi Web Server 02-00 (Solaris)
Hitachi Web Server 02-00 (Linux)
Hitachi Web Server 02-00 (Linux AP8000)
Hitachi Web Server 02-00 (HP-UX)
Hitachi Web Server 02-00 (HP-UX 11.0)
Hitachi Web Server 02-00 (AIX)
Hitachi Web Server 01-02-/E(*1) (AIX)
Hitachi Web Server 01-02-/E (AIX)
Hitachi Web Server 01-02-/D(1*) (Solari
Hitachi Web Server 01-02-/D(*1)(HP-UX 1
Hitachi Web Server 01-02-/D(*1) (HP-UX
Hitachi Web Server 01-02-/D (Solaris)
Hitachi Web Server 01-02-/D (HP-UX)
Hitachi Web Server 01-02 (AIX)
Hitachi Web Server 01-01-/D(1*) (Linux)
Hitachi Web Server 01-01-/D (Linux)
Hitachi Web Server 01-01(*2) (Linux for
Hitachi Web Server 01-01 (Turbolinux)
Hitachi Web Server 01-01 (Linux)
Hitachi Web Server 01-01 (Linux MP)
Hitachi Web Server 01-01 (AIX)
Hitachi Web Server 01-00 (Solaris)
Hitachi Web Server 01-00 (HP-UX)
Hitachi Web Server 01-00 (HP-UX 11.0)
Hitachi Web Server 01-00 (HP-UX 10.20)
Hitachi Web Server 0
Hitachi uCosminexus Service Platform(64) 09-60 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50-02 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Service Platform(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-50 (Windows(x86))
Hitachi uCosminexus Service Platform(64) 09-50 (Windows(x64))
Hitachi uCosminexus Service Platform(64) 09-50 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50 (AIX)
Hitachi uCosminexus Service Platform(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Service Platform(64) 09-00-03 (Linux)
Hitachi uCosminexus Service Platform(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Service Platform(64) 09-00-02 (AIX)
Hitachi uCosminexus Service Platform(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-00 (Windows(x86))
Hitachi uCosminexus Service Platform(64) 09-00 (Windows(x64))
Hitachi uCosminexus Service Platform(64) 09-00 (Linux)
Hitachi uCosminexus Service Platform(64) 09-00 (AIX)
Hitachi uCosminexus Service Platform 09-60 (Linux)
Hitachi uCosminexus Service Platform 09-50-02 (Linux)
Hitachi uCosminexus Service Platform 09-50-01 (Windows(x6
Hitachi uCosminexus Service Platform 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-50 (Windows)
Hitachi uCosminexus Service Platform 09-50 (Windows(x86))
Hitachi uCosminexus Service Platform 09-50 (Windows(x64))
Hitachi uCosminexus Service Platform 09-50 (Linux)
Hitachi uCosminexus Service Platform 09-50 (HP-UX(IPF))
Hitachi uCosminexus Service Platform 09-50 (AIX)
Hitachi uCosminexus Service Platform 09-00-03 (Windows(x8
Hitachi uCosminexus Service Platform 09-00-03 (Linux)
Hitachi uCosminexus Service Platform 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-00-02 (Windows(x6
Hitachi uCosminexus Service Platform 09-00-02 (AIX)
Hitachi uCosminexus Service Platform 09-00 Windows (x64)
Hitachi uCosminexus Service Platform 09-00 Linux (x64)
Hitachi uCosminexus Service Platform 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-00 HP-UX (IPF)
Hitachi uCosminexus Service Platform 09-00 AIX (64)
Hitachi uCosminexus Service Platform 09-00 (Windows)
Hitachi uCosminexus Service Platform 09-00 (Windows(x86))
Hitachi uCosminexus Service Platform 09-00 (Windows(x64))
Hitachi uCosminexus Service Platform 09-00 (Linux)
Hitachi uCosminexus Service Platform 09-00 (HP-UX(IPF))
Hitachi uCosminexus Service Platform 09-00 (AIX)
Hitachi uCosminexus Service Platform 0
Hitachi uCosminexus Service Architect 09-60 (Linux)
Hitachi uCosminexus Service Architect 09-50-02 (Linux)
Hitachi uCosminexus Service Architect 09-50-01 (Windows(x6
Hitachi uCosminexus Service Architect 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-50 (Windows)
Hitachi uCosminexus Service Architect 09-50 (Windows(x86))
Hitachi uCosminexus Service Architect 09-50 (Windows(x64))
Hitachi uCosminexus Service Architect 09-50 (Linux)
Hitachi uCosminexus Service Architect 09-50 (HP-UX(IPF))
Hitachi uCosminexus Service Architect 09-50 (AIX)
Hitachi uCosminexus Service Architect 09-00-03 (Windows(x8
Hitachi uCosminexus Service Architect 09-00-03 (Linux)
Hitachi uCosminexus Service Architect 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-00-02 (Windows(x6
Hitachi uCosminexus Service Architect 09-00-02 (AIX)
Hitachi uCosminexus Service Architect 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-00 (Windows(x86))
Hitachi uCosminexus Service Architect 09-00 (Windows(x64))
Hitachi uCosminexus Service Architect 09-00 (Linux)
Hitachi uCosminexus Service Architect 09-00 (HP-UX(IPF))
Hitachi uCosminexus Service Architect 09-00 (AIX)
Hitachi uCosminexus Service Architect 09-00
Hitachi uCosminexus Service Architect 0
Hitachi uCosminexus Primary Server Base(64) 09-60 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50-02 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Primary Server Base(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-50 (Windows(x86))
Hitachi uCosminexus Primary Server Base(64) 09-50 (Windows(x64))
Hitachi uCosminexus Primary Server Base(64) 09-50 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50 (AIX)
Hitachi uCosminexus Primary Server Base(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Primary Server Base(64) 09-00-03 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Primary Server Base(64) 09-00-02 (AIX)
Hitachi uCosminexus Primary Server Base(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-00 (Windows(x86))
Hitachi uCosminexus Primary Server Base(64) 09-00 (Windows(x64))
Hitachi uCosminexus Primary Server Base(64) 09-00 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-00 (AIX)
Hitachi uCosminexus Primary Server Base 09-50-02 (Linux)
Hitachi uCosminexus Primary Server Base 09-50-01 (Windows(x6
Hitachi uCosminexus Primary Server Base 09-50 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-50 (Windows)
Hitachi uCosminexus Primary Server Base 09-50 (Windows(x86))
Hitachi uCosminexus Primary Server Base 09-50 (Windows(x64))
Hitachi uCosminexus Primary Server Base 09-50 (Linux)
Hitachi uCosminexus Primary Server Base 09-50 (HP-UX(IPF))
Hitachi uCosminexus Primary Server Base 09-50 (AIX)
Hitachi uCosminexus Primary Server Base 09-00-03 (Windows(x8
Hitachi uCosminexus Primary Server Base 09-00-03 (Linux)
Hitachi uCosminexus Primary Server Base 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-00-02 (Windows(x6
Hitachi uCosminexus Primary Server Base 09-00-02 (AIX)
Hitachi uCosminexus Primary Server Base 09-00 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-00 (Windows)
Hitachi uCosminexus Primary Server Base 09-00 (Windows(x86))
Hitachi uCosminexus Primary Server Base 09-00 (Windows(x64))
Hitachi uCosminexus Primary Server Base 09-00 (Linux)
Hitachi uCosminexus Primary Server Base 09-00 (HP-UX(IPF))
Hitachi uCosminexus Primary Server Base 09-00 (AIX)
Hitachi uCosminexus Primary Server Base 0
Hitachi uCosminexus Operator for Service Platform 09-50 (Windows)
Hitachi uCosminexus Operator for Service Platform 09-50 (Windows(x64))
Hitachi uCosminexus Operator for Service Platform 09-50 (Linux)
Hitachi uCosminexus Operator for Service Platform 09-50 (HP-UX(IPF))
Hitachi uCosminexus Operator for Service Platform 09-50 (AIX)
Hitachi uCosminexus Operator for Service Platform 09-00 (Windows)
Hitachi uCosminexus Operator for Service Platform 09-00 (Windows(x64))
Hitachi uCosminexus Operator for Service Platform 09-00 (Linux)
Hitachi uCosminexus Operator for Service Platform 09-00 (HP-UX(IPF))
Hitachi uCosminexus Operator for Service Platform 09-00 (AIX)
Hitachi uCosminexus Developer Standard 6.7
Hitachi uCosminexus Developer Standard 0
Hitachi uCosminexus Developer Professional for Plug-in 0
Hitachi uCosminexus Developer Professional 6.7
Hitachi uCosminexus Developer Professional 0
Hitachi uCosminexus Developer Light 6.7
Hitachi uCosminexus Developer 01 0
Hitachi uCosminexus Developer 09-60 (Linux)
Hitachi uCosminexus Developer 09-50-02 (Linux)
Hitachi uCosminexus Developer 09-50-01 (Windows(x6
Hitachi uCosminexus Developer 09-50 HP-UX(IPF)
Hitachi uCosminexus Developer 09-50 (Windows)
Hitachi uCosminexus Developer 09-50 (Windows(x86))
Hitachi uCosminexus Developer 09-50 (Windows(x64))
Hitachi uCosminexus Developer 09-50 (Linux)
Hitachi uCosminexus Developer 09-50 (HP-UX(IPF))
Hitachi uCosminexus Developer 09-50 (AIX)
Hitachi uCosminexus Developer 09-00-03 (Windows(x8
Hitachi uCosminexus Developer 09-00-03 (Linux)
Hitachi uCosminexus Developer 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Developer 09-00-02 (Windows(x6
Hitachi uCosminexus Developer 09-00-02 (AIX)
Hitachi uCosminexus Developer 09-00 HP-UX(IPF)
Hitachi uCosminexus Developer 09-00 (Windows(x86))
Hitachi uCosminexus Developer 09-00 (Windows(x64))
Hitachi uCosminexus Developer 09-00 (Linux)
Hitachi uCosminexus Developer 09-00 (AIX)
Hitachi uCosminexus Developer 09-00
Hitachi uCosminexus Developer 0
Hitachi uCosminexus Client 09-50 (Windows)
Hitachi uCosminexus Client 09-50 (Windows(x64))
Hitachi uCosminexus Client 09-50 (Linux)
Hitachi uCosminexus Client 09-50 (HP-UX(IPF))
Hitachi uCosminexus Client 09-50 (AIX)
Hitachi uCosminexus Client 09-00 (Windows)
Hitachi uCosminexus Client 09-00 (Windows(x64))
Hitachi uCosminexus Client 09-00 (Linux)
Hitachi uCosminexus Client 09-00 (HP-UX(IPF))
Hitachi uCosminexus Client 09-00 (AIX)
Hitachi uCosminexus Client 09-00
Hitachi uCosminexus Client 0
Hitachi uCosminexus Application Server-r 09-60 (Linux)
Hitachi uCosminexus Application Server-r 09-50-02 (Linux)
Hitachi uCosminexus Application Server-r 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server-r 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-50 (Windows)
Hitachi uCosminexus Application Server-r 09-50 (Windows(x86))
Hitachi uCosminexus Application Server-r 09-50 (Windows(x64))
Hitachi uCosminexus Application Server-r 09-50 (Linux)
Hitachi uCosminexus Application Server-r 09-50 (HP-UX(IPF))
Hitachi uCosminexus Application Server-r 09-50 (AIX)
Hitachi uCosminexus Application Server-r 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server-r 09-00-03 (Linux)
Hitachi uCosminexus Application Server-r 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server-r 09-00-02 (AIX)
Hitachi uCosminexus Application Server-r 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-00 (Windows)
Hitachi uCosminexus Application Server-r 09-00 (Windows(x86))
Hitachi uCosminexus Application Server-r 09-00 (Windows(x64))
Hitachi uCosminexus Application Server-r 09-00 (Linux)
Hitachi uCosminexus Application Server-r 09-00 (HP-UX(IPF))
Hitachi uCosminexus Application Server-r 09-00 (AIX)
Hitachi uCosminexus Application Server-r 0
Hitachi uCosminexus Application Server(64) 09-60 (Linux)
Hitachi uCosminexus Application Server(64) 09-50-02 (Linux)
Hitachi uCosminexus Application Server(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-50 (Windows(x86))
Hitachi uCosminexus Application Server(64) 09-50 (Windows(x64))
Hitachi uCosminexus Application Server(64) 09-50 (Linux)
Hitachi uCosminexus Application Server(64) 09-50 (AIX)
Hitachi uCosminexus Application Server(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server(64) 09-00-03 (Linux)
Hitachi uCosminexus Application Server(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server(64) 09-00-02 (AIX)
Hitachi uCosminexus Application Server(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-00 (Windows(x86))
Hitachi uCosminexus Application Server(64) 09-00 (Windows(x64))
Hitachi uCosminexus Application Server(64) 09-00 (Linux)
Hitachi uCosminexus Application Server(64) 09-00 (AIX)
Hitachi uCosminexus Application Server Standard-R 0
Hitachi uCosminexus Application Server Standard 6.7
Hitachi uCosminexus Application Server Standard 0
Hitachi uCosminexus Application Server Smart Edition 0
Hitachi uCosminexus Application Server Express 09-70 (AIX)
Hitachi uCosminexus Application Server Enterprise 6.7
Hitachi uCosminexus Application Server Enterprise 09-80 (Windows(x64))
Hitachi uCosminexus Application Server 09-60 (Linux)
Hitachi uCosminexus Application Server 09-50-02 (Linux)
Hitachi uCosminexus Application Server 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-50 (Windows(x86))
Hitachi uCosminexus Application Server 09-50 (Windows(x64))
Hitachi uCosminexus Application Server 09-50 (Linux)
Hitachi uCosminexus Application Server 09-50 (HP-UX(IPF))
Hitachi uCosminexus Application Server 09-50 (AIX)
Hitachi uCosminexus Application Server 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server 09-00-03 (Linux)
Hitachi uCosminexus Application Server 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server 09-00-02 (AIX)
Hitachi uCosminexus Application Server 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-00 (Windows(x86))
Hitachi uCosminexus Application Server 0
Hitachi uCosminexus Application Server 09-00
Hitachi Hitachi Web Server 04-10-03 Windows (x64)
Hitachi Hitachi Web Server 04-10-01 Windows (x64)
Hitachi Hitachi Web Server 03-00-06 Windows 0
Hitachi Hitachi Web Server - Security Enhancement 02-04-/B (Hitachi)
Hitachi Hitachi Web Server 04-10-03 Windows
Hitachi Hitachi Web Server 04-10-02 HP-UX (IPF)
Hitachi Hitachi Web Server 04-10-01 HP-UX (IPF)
Hitachi Hitachi Web Server 04-10 Windows
Hitachi Hitachi Web Server 04-00-05 Windows
Hitachi Hitachi Web Server 04-00-04 HP-UX (IPF)
Hitachi Hitachi Web Server 04-00-01 Solaris
Hitachi Hitachi Web Server 04-00 Windows
Hitachi Hitachi Web Server 04-00 Linux (IPF)
Hitachi Hitachi Web Server 04-00 Linux
Hitachi Hitachi Web Server 04-00 HP-UX (IPF)
Hitachi Hitachi Web Server 04-00 AIX
Hitachi Hitachi Web Server 03-10-10 Windows
Hitachi Hitachi Web Server 03-10-09 HP-UX (IPF)
Hitachi Hitachi Web Server 03-10 Windows
Hitachi Hitachi Web Server 03-10 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00-05 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00-02 (Windows)
Hitachi Hitachi Web Server 03-00-01 HP-UX
Hitachi Hitachi Web Server 03-00-01 (HP-UX(IPF)
Hitachi Hitachi Web Server 03-00 Windows
Hitachi Hitachi Web Server 03-00 Solaris
Hitachi Hitachi Web Server 03-00 Linux (IPF)
Hitachi Hitachi Web Server 03-00 Linux
Hitachi Hitachi Web Server 03-00 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00 HP-UX
Hitachi Hitachi Web Server 03-00 AIX
Hitachi Hitachi Web Server 02-05 (Linux)
Hitachi Hitachi Web Server 02-04-/C (Windows)
Hitachi Hitachi Web Server 02-04-/B (Windows)
Hitachi Hitachi Web Server 02-04-/B (Linux(IPF)
Hitachi Hitachi Web Server 02-04-/A (Windows)
Hitachi Hitachi Web Server 02-04-/A (Windows(IP
Hitachi Hitachi Web Server 02-04-/A (Solaris)
Hitachi Hitachi Web Server 02-04-/A (Linux IPF)
Hitachi Hitachi Web Server 02-04-/A (HP-UX)
Hitachi Hitachi Web Server 02-04-/A (AIX)
Hitachi Hitachi Web Server 02-04 (Windows)
Hitachi Hitachi Web Server 02-04 (Linux)
Hitachi Hitachi Web Server 02-04 (HP-UX(IPF))
Hitachi Hitachi Web Server 02-03 (Windows)
Hitachi Hitachi Web Server 02-03 (Solaris)
Hitachi Hitachi Web Server 02-03 (Linux)
Hitachi Hitachi Web Server 02-03 (Linux IPF)
Hitachi Hitachi Web Server 02-03 (HP-UX)
Hitachi Hitachi Web Server 02-03 (HP-UX(IPF))
Hitachi Hitachi Web Server 02-03 (AIX)
Hitachi Hitachi Web Server 02-02 (Windows)
Hitachi Hitachi Web Server 02-02 (Solaris)
Hitachi Hitachi Web Server 02-02 (HP-UX)
Hitachi Hitachi Web Server 02-02 (AIX)
Hitachi Hitachi Web Server 02-01 (Windows)
Hitachi Hitachi Web Server 02-01 (Solaris)
Hitachi Hitachi Web Server 02-01 (HP-UX)
Hitachi Hitachi Web Server 02-01 (AIX)
Hitachi Hitachi Web Server 01-02-/D (AIX)
Hitachi Hitachi Web Server 01-02-/C (Solaris)
Hitachi Hitachi Web Server 01-02-/C (HP-UX)
Hitachi Hitachi Web Server 01-02-/C (AIX)
Hitachi Hitachi Web Server 01-02-/B (Solaris)
Hitachi Hitachi Web Server 01-02-/B (HP-UX)
Hitachi Hitachi Web Server 01-02-/B (AIX)
Hitachi Hitachi Web Server 01-02-/A (Solaris)
Hitachi Hitachi Web Server 01-02-/A (HP-UX)
Hitachi Hitachi Web Server 01-02-/A (AIX)
Hitachi Hitachi Web Server 01-02 (Solaris)
Hitachi Hitachi Web Server 01-02 (HP-UX)
Hitachi Cosminexus Primary Server Base 6.0
Hitachi Cosminexus Primary Server Base 0
Hitachi Cosminexus Primary Server 6.0
Hitachi Cosminexus HTTP Server 09-00-10 Windows
Hitachi Cosminexus HTTP Server 09-00-10 Linux(x64)
Hitachi Cosminexus HTTP Server 09-00-10 HP-UX(IPF)
Hitachi Cosminexus HTTP Server 09-00-10 (AIX)
Hitachi Cosminexus HTTP Server 09-00 Windows(x64)
Hitachi Cosminexus HTTP Server 09-00 Windows
Hitachi Cosminexus HTTP Server 09-00 Linux(x64)
Hitachi Cosminexus HTTP Server 09-00 HP-UX(IPF)
Hitachi Cosminexus HTTP Server 09-00 (AIX)
Hitachi Cosminexus Developer Standard 6.0
Hitachi Cosminexus Developer Professional 6.0
Hitachi Cosminexus Developer 5.0
Hitachi Cosminexus Developer 6.0
Hitachi Cosminexus Application Server Standard 6.0
Hitachi Cosminexus Application Server no version 0
Hitachi Cosminexus Application Server Enterprise 6.0
Hitachi Cosminexus Application Server 6.0
Hitachi Cosminexus Application Server 5.0
Hitachi Cosminexus 9.0
Hitachi Cosminexus 8.0
Hitachi Cosminexus 7.0
Hitachi Cosminexus 6.0
Hitachi Cosminexus 5.0
Google Chrome 27.0.1444 3
Google Chrome 25.0.1364 160
Google Chrome 17.0.963 79
Google Chrome 17.0.963 65
Google Chrome 16.0.912 75
Google Chrome 15.0.874 102
Google Chrome 6.0.472 55
Google Chrome 5.0.375 99
Google Chrome 5.0.375 86
Google Chrome 5.0.375 127
Google Chrome 5.0.375 125
Google Chrome 5.0.375 .70
Google Chrome 5.0.375 .55
Google Chrome 4.1.249 1064
Google Chrome 4.1.249 1059
Google Chrome 4.1.249 1036
Google Chrome 4.1.249 .1045
Google Chrome 4.1.249 .1042
Google Chrome 4.0.249 .89
Google Chrome 4.0.249 .78
Google Chrome 3.0.195 .38
Google Chrome 3.0.195 .33
Google Chrome 3.0.195 .32
Google Chrome 3.0.195 .24
Google Chrome 3.0.195 .21
Google Chrome 2.0.172 .43
Google Chrome 2.0.172 .37
Google Chrome 2.0.172 .33
Google Chrome 2.0.172 .31
Google Chrome 2.0.172 .30
Google Chrome 1.0.154 .61
Google Chrome 9.0.597.94
Google Chrome 9.0.597.84
Google Chrome 9.0.597.107
Google Chrome 9
Google Chrome 8.0.552.344
Google Chrome 8.0.552.310
Google Chrome 8.0.552.309
Google Chrome 8.0.552.308
Google Chrome 8.0.552.307
Google Chrome 8.0.552.306
Google Chrome 8.0.552.305
Google Chrome 8.0.552.304
Google Chrome 8.0.552.303
Google Chrome 8.0.552.302
Google Chrome 8.0.552.301
Google Chrome 8.0.552.300
Google Chrome 8.0.552.237
Google Chrome 8.0.552.226
Google Chrome 8.0.552.225
Google Chrome 8.0.552.224
Google Chrome 8.0.552.223
Google Chrome 8.0.552.222
Google Chrome 8.0.552.221
Google Chrome 8.0.552.220
Google Chrome 8.0.552.219
Google Chrome 8.0.552.218
Google Chrome 8.0.552.217
Google Chrome 8.0.552.216
Google Chrome 8.0.552.215
Google Chrome 8.0.552.214
Google Chrome 8.0.552.213
Google Chrome 8.0.552.212
Google Chrome 8.0.552.211
Google Chrome 8.0.552.210
Google Chrome 8.0.552.21
Google Chrome 8.0.552.209
Google Chrome 8.0.552.208
Google Chrome 8.0.552.207
Google Chrome 8.0.552.206
Google Chrome 8.0.552.205
Google Chrome 8.0.552.204
Google Chrome 8.0.552.203
Google Chrome 8.0.552.202
Google Chrome 8.0.552.201
Google Chrome 8.0.552.200
Google Chrome 8.0.552.20
Google Chrome 8.0.552.2
Google Chrome 8.0.552.19
Google Chrome 8.0.552.18
Google Chrome 8.0.552.17
Google Chrome 8.0.552.16
Google Chrome 8.0.552.15
Google Chrome 8.0.552.14
Google Chrome 8.0.552.13
Google Chrome 8.0.552.12
Google Chrome 8.0.552.11
Google Chrome 8.0.552.105
Google Chrome 8.0.552.104
Google Chrome 8.0.552.103
Google Chrome 8.0.552.102
Google Chrome 8.0.552.101
Google Chrome 8.0.552.100
Google Chrome 8.0.552.10
Google Chrome 8.0.552.1
Google Chrome 8.0.552.0
Google Chrome 8.0.551.1
Google Chrome 8.0.551.0
Google Chrome 8.0.550.0
Google Chrome 8.0.549.0
Google Chrome 7.0.548.0
Google Chrome 7.0.517.44
Google Chrome 7.0.517.43
Google Chrome 7.0.517.41
Google Chrome 65
Google Chrome 64
Google Chrome 6.0.472.62
Google Chrome 6.0.472.59
Google Chrome 6.0.472.53
Google Chrome 4.0.211.0
Google Chrome 4
Google Chrome 3.0 Beta
Google Chrome 3
Google Chrome 26.0.1410.43
Google Chrome 26.0.1410.28
Google Chrome 25.0.1364.99
Google Chrome 25.0.1364.97
Google Chrome 25.0.1364.172
Google Chrome 25.0.1364.152
Google Chrome 25
Google Chrome 24.0.1312.70
Google Chrome 24.0.1312.57
Google Chrome 24.0.1312.56
Google Chrome 24.0.1312.52
Google Chrome 23.0.1271.97
Google Chrome 23.0.1271.95
Google Chrome 23.0.1271.91
Google Chrome 23.0.1271.64
Google Chrome 22.0.1229.94
Google Chrome 22.0.1229.92
Google Chrome 22.0.1229.79
Google Chrome 22
Google Chrome 21.0.1180.89
Google Chrome 21.0.1180.83
Google Chrome 21.0.1180.82
Google Chrome 21.0.1180.81
Google Chrome 21.0.1180.79
Google Chrome 21.0.1180.75
Google Chrome 21.0.1180.60
Google Chrome 21.0.1180.57
Google Chrome 21.0.1180.50
Google Chrome 21.0.1180.49
Google Chrome 21
Google Chrome 20.0.1132.57
Google Chrome 20.0.1132.43
Google Chrome 20.0.1132.23
Google Chrome 20
Google Chrome 19.0.1084.52
Google Chrome 19.0.1084.21
Google Chrome 19
Google Chrome 18.0.1025.168
Google Chrome 18.0.1025.162
Google Chrome 18.0.1025.151
Google Chrome 18.0.1025.142
Google Chrome 18
Google Chrome 17.0.963.83
Google Chrome 17.0.963.78
Google Chrome 17.0.963.60
Google Chrome 17.0.963.56
Google Chrome 17.0.963.46
Google Chrome 17
Google Chrome 16.0.912.77
Google Chrome 16.0.912.75
Google Chrome 16.0.912.63
Google Chrome 16
Google Chrome 15.0.874.121
Google Chrome 15.0.874.120
Google Chrome 15
Google Chrome 14.0.835.202
Google Chrome 14.0.835.186
Google Chrome 14.0.835.163
Google Chrome 14
Google Chrome 13.0.782.215
Google Chrome 13.0.782.112
Google Chrome 13.0.782.107
Google Chrome 13
Google Chrome 12.0.742.91
Google Chrome 12.0.742.112
Google Chrome 12.0.742.100
Google Chrome 12
Google Chrome 11.0.696.77
Google Chrome 11.0.696.71
Google Chrome 11.0.696.68
Google Chrome 11.0.696.65
Google Chrome 11.0.696.57
Google Chrome 11.0.696.43
Google Chrome 11.0.672.2
Google Chrome 11
Google Chrome 10.0.648.205
Google Chrome 10.0.648.205
Google Chrome 10.0.648.204
Google Chrome 10.0.648.133
Google Chrome 10.0.648.128
Google Chrome 10.0.648.127
Google Chrome 10.0.648.127
Google Chrome 10
Google Chrome 1.0.154.65
Google Chrome 1.0.154.64
Google Chrome 1.0.154.59
Google Chrome 1.0.154.55
Google Chrome 1.0.154.53
Google Chrome 1.0.154.48
Google Chrome 1.0.154.46
Google Chrome 1.0.154.36
Gentoo Linux
F5 FirePass 7.0
F5 FirePass 6.1
F5 FirePass 6.0
F5 Enterprise Manager 3.1.1
F5 Enterprise Manager 3.1
F5 Enterprise Manager 3.0
F5 Enterprise Manager 2.3
F5 Enterprise Manager 2.1
F5 Enterprise Manager 2.0
F5 Enterprise Manager 1.8
F5 Enterprise Manager 1.6
F5 BIG-IQ Security 4.3
F5 BIG-IQ Security 4.2
F5 BIG-IQ Security 4.1
F5 BIG-IQ Security 4.0
F5 BIG-IQ Cloud 4.3
F5 BIG-IQ Cloud 4.2
F5 BIG-IQ Cloud 4.1
F5 BIG-IQ Cloud 4.0
F5 BIG-IP WOM 11.2
F5 BIG-IP WOM 11.0
F5 BIG-IP WOM 10.2.4
F5 BIG-IP WOM 10.2.2
F5 BIG-IP WOM 10.2.1
F5 BIG-IP WOM 10.0
F5 BIG-IP WOM 11.3.0
F5 BIG-IP WOM 11.2.1 HF5
F5 BIG-IP WOM 11.2.1 HF3
F5 BIG-IP WOM 11.2.1
F5 BIG-IP WOM 11.2.0 HF5
F5 BIG-IP WOM 11.2.0 HF3
F5 BIG-IP WOM 11.1.0 HF7
F5 BIG-IP WOM 11.1.0
F5 BIG-IP WOM 10.2.1 HF1
F5 BIG-IP WebAccelerator 9.4.8 0
F5 BIG-IP WebAccelerator 11.2.0 0
F5 BIG-IP WebAccelerator 11.3
F5 BIG-IP WebAccelerator 11.2.1 HF3
F5 BIG-IP WebAccelerator 11.2.1
F5 BIG-IP WebAccelerator 11.2 HF3
F5 BIG-IP WebAccelerator 11.1
F5 BIG-IP WebAccelerator 11.0
F5 BIG-IP WebAccelerator 10.2.4
F5 BIG-IP WebAccelerator 10.2.1
F5 BIG-IP WebAccelerator 10.0
F5 BIG-IP WebAccelerator 9.4
F5 BIG-IP WebAccelerator 11.2.1 HF5
F5 BIG-IP WebAccelerator 11.2.0 HF5
F5 BIG-IP WebAccelerator 11.1.0 HF7
F5 BIG-IP WebAccelerator 10.2.1 HF1
F5 BIG-IP PSM 11.5.1
F5 BIG-IP PSM 11.5
F5 BIG-IP PSM 11.4.1
F5 BIG-IP PSM 11.3
F5 BIG-IP PSM 11.2
F5 BIG-IP PSM 11.1
F5 BIG-IP PSM 11.0
F5 BIG-IP PSM 10.2.4
F5 BIG-IP PSM 10.2.1
F5 BIG-IP PSM 10.0
F5 BIG-IP PSM 9.4.8
F5 BIG-IP PSM 9.4.5
F5 BIG-IP PSM 11.3.0 HF4
F5 BIG-IP PSM 11.2.1 HF5
F5 BIG-IP PSM 11.2.1 HF3
F5 BIG-IP PSM 11.2.1 HF2
F5 BIG-IP PSM 11.2.1 HF1
F5 BIG-IP PSM 11.2.1
F5 BIG-IP PSM 11.2.0 HF5
F5 BIG-IP PSM 11.2.0 HF3
F5 BIG-IP PSM 11.2.0 HF2
F5 BIG-IP PSM 11.1.0 HF7
F5 BIG-IP PSM 10.2.1 HF1
F5 BIG-IP PEM 11.5.1
F5 BIG-IP PEM 11.5
F5 BIG-IP PEM 11.3
F5 BIG-IP PEM 11.4.1
F5 BIG-IP PEM 11.3.0 HF4
F5 BIG-IP LTM 11.5.1
F5 BIG-IP LTM 11.5
F5 BIG-IP LTM 11.2.1 HF3
F5 BIG-IP LTM 11.2 HF3
F5 BIG-IP LTM 11.2
F5 BIG-IP LTM 11.0
F5 BIG-IP LTM 10.2.4
F5 BIG-IP LTM 10.2.2
F5 BIG-IP LTM 10.0
F5 BIG-IP LTM 9.6.1
F5 BIG-IP LTM 9.4.8
F5 BIG-IP LTM 9.0
F5 BIG-IP LTM 11.5
F5 BIG-IP LTM 11.4.1
F5 BIG-IP LTM 11.3.0 HF4
F5 BIG-IP LTM 11.3.0
F5 BIG-IP LTM 11.2.1 HF5
F5 BIG-IP LTM 11.2.1 HF2
F5 BIG-IP LTM 11.2.1 HF1
F5 BIG-IP LTM 11.2.1
F5 BIG-IP LTM 11.2.0 HF5
F5 BIG-IP LTM 11.2.0 HF2
F5 BIG-IP LTM 11.1.0 HF7
F5 BIG-IP LTM 11.1.0
F5 BIG-IP LTM 10.2.1 HF1
F5 BIG-IP LTM 10.2.1
F5 BIG-IP Link Controller 9.4.8 0
F5 BIG-IP Link Controller 11.2.0 0
F5 BIG-IP Link Controller 11.5.1
F5 BIG-IP Link Controller 11.5
F5 BIG-IP Link Controller 11.3
F5 BIG-IP Link Controller 11.2.1 HF3
F5 BIG-IP Link Controller 11.2.1
F5 BIG-IP Link Controller 11.2 HF3
F5 BIG-IP Link Controller 11.1
F5 BIG-IP Link Controller 11.0
F5 BIG-IP Link Controller 10.2.4
F5 BIG-IP Link Controller 10.2.2
F5 BIG-IP Link Controller 10.2.1
F5 BIG-IP Link Controller 10.0
F5 BIG-IP Link Controller 9.2.2
F5 BIG-IP Link Controller 11.4.1
F5 BIG-IP Link Controller 11.3.0 HF4
F5 BIG-IP Link Controller 11.2.1 HF5
F5 BIG-IP Link Controller 11.2.1 HF2
F5 BIG-IP Link Controller 11.2.1 HF1
F5 BIG-IP Link Controller 11.2.0 HF5
F5 BIG-IP Link Controller 11.2.0 HF2
F5 BIG-IP Link Controller 11.1.0 HF7
F5 BIG-IP Link Controller 10.2.1 HF1
F5 BIG-IP GTM 11.5.1
F5 BIG-IP GTM 11.5
F5 BIG-IP GTM 11.3
F5 BIG-IP GTM 11.2.1 HF3
F5 BIG-IP GTM 11.2
F5 BIG-IP GTM 11.0
F5 BIG-IP GTM 10.2.4
F5 BIG-IP GTM 10.2.2
F5 BIG-IP GTM 10.2.1
F5 BIG-IP GTM 10.0
F5 BIG-IP GTM 9.4.8
F5 BIG-IP GTM 9.2.2
F5 BIG-IP GTM 11.4.1
F5 BIG-IP GTM 11.3.0 HF4
F5 BIG-IP GTM 11.2.1 HF5
F5 BIG-IP GTM 11.2.1 HF2
F5 BIG-IP GTM 11.2.1 HF1
F5 BIG-IP GTM 11.2.1
F5 BIG-IP GTM 11.2.0 HF5
F5 BIG-IP GTM 11.2.0 HF3
F5 BIG-IP GTM 11.2.0 HF2
F5 BIG-IP GTM 11.1.0 HF7
F5 BIG-IP GTM 11.1.0
F5 BIG-IP GTM 10.2.1 HF1
F5 BIG-IP Edge Gateway 11.3
F5 BIG-IP Edge Gateway 11.2.1 HF3
F5 BIG-IP Edge Gateway 11.2.1
F5 BIG-IP Edge Gateway 11.2 HF3
F5 BIG-IP Edge Gateway 11.2
F5 BIG-IP Edge Gateway 11.1
F5 BIG-IP Edge Gateway 11.0
F5 BIG-IP Edge Gateway 10.2.4
F5 BIG-IP Edge Gateway 10.2.2
F5 BIG-IP Edge Gateway 10.2.1
F5 BIG-IP Edge Gateway 10.1
F5 BIG-IP Edge Gateway 11.2.1 HF5
F5 BIG-IP Edge Gateway 11.2.1 HF2
F5 BIG-IP Edge Gateway 11.2.0 HF5
F5 BIG-IP Edge Gateway 11.1.0 HF7
F5 BIG-IP Edge Gateway 10.2.1 HF1
F5 BIG-IP Edge Gateway 10.1
F5 BIG-IP ASM 9.4.8 0
F5 BIG-IP ASM 11.2.0 HF2 0
F5 BIG-IP ASM 11.2.0 0
F5 BIG-IP ASM 11.0.0 0
F5 BIG-IP ASM 10.2.4 0
F5 BIG-IP ASM 10.0.0 0
F5 BIG-IP ASM 11.5.1
F5 BIG-IP ASM 11.5
F5 BIG-IP ASM 10.2.2
F5 BIG-IP ASM 10.2.1
F5 BIG-IP ASM 9.2
F5 BIG-IP ASM 11.4.1
F5 BIG-IP ASM 11.3.0 HF4
F5 BIG-IP ASM 11.3.0
F5 BIG-IP ASM 11.2.1 HF5
F5 BIG-IP ASM 11.2.1 HF3
F5 BIG-IP ASM 11.2.1 HF2
F5 BIG-IP ASM 11.2.1 HF1
F5 BIG-IP ASM 11.2.1
F5 BIG-IP ASM 11.2.0 HF5
F5 BIG-IP ASM 11.2.0 HF3
F5 BIG-IP ASM 11.1.0 HF7
F5 BIG-IP ASM 11.1.0
F5 BIG-IP ASM 10.2.1 HF1
F5 BIG-IP APM 11.5.1
F5 BIG-IP APM 11.2
F5 BIG-IP APM 11.0
F5 BIG-IP APM 10.2.4
F5 BIG-IP APM 10.2.2
F5 BIG-IP APM 11.5.0
F5 BIG-IP APM 11.4.1
F5 BIG-IP APM 11.4.0
F5 BIG-IP APM 11.3.0 HF4
F5 BIG-IP APM 11.3.0
F5 BIG-IP APM 11.2.1 HF5
F5 BIG-IP APM 11.2.1 HF3
F5 BIG-IP APM 11.2.1 HF2
F5 BIG-IP APM 11.2.1 HF1
F5 BIG-IP APM 11.2.1
F5 BIG-IP APM 11.2.0 HF5
F5 BIG-IP APM 11.2.0 HF3
F5 BIG-IP APM 11.2.0 HF2
F5 BIG-IP APM 11.1.0 HF7
F5 BIG-IP APM 11.1.0
F5 BIG-IP APM 10.2.1 HF1
F5 BIG-IP APM 10.2.1
F5 BIG-IP APM 10.1
F5 BIG-IP Analytics 11.5.1
F5 BIG-IP Analytics 11.5
F5 BIG-IP Analytics 11.3
F5 BIG-IP Analytics 11.2.1 HF3
F5 BIG-IP Analytics 11.2.1
F5 BIG-IP Analytics 11.2 HF3
F5 BIG-IP Analytics 11.2
F5 BIG-IP Analytics 11.4.1
F5 BIG-IP Analytics 11.3.0 HF4
F5 BIG-IP Analytics 11.2.1 HF5
F5 BIG-IP Analytics 11.2.1 HF2
F5 BIG-IP Analytics 11.2.1 HF1
F5 BIG-IP Analytics 11.2.0 HF5
F5 BIG-IP Analytics 11.2.0 HF2
F5 BIG-IP Analytics 11.1.0 HF7
F5 BIG-IP Analytics 11.1.0
F5 BIG-IP Analytics 11.0.0-HF2
F5 BIG-IP Analytics 11.0.0
F5 BIG-IP AFM 11.5.1
F5 BIG-IP AFM 11.5
F5 BIG-IP AFM 11.3
F5 BIG-IP AFM 11.4.1
F5 BIG-IP AFM 11.3.0 HF4
F5 BIG-IP AAM 11.5.1
F5 BIG-IP AAM 11.5
F5 BIG-IP AAM 11.4.1
F5 BIG-IP AAM 11.4.0
F5 ARX 6.4
F5 ARX 6.3
F5 ARX 6.2
F5 ARX 6.1.1
F5 ARX 6.1
F5 ARX 6.0
EMC RSA Validation Manager 3.2
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.0.1
Apple Safari 5.0.6
Apple Safari 4.1.2 for Windows
Apple Safari 4.0.5 for Windows
Apple Safari 4.0.5
Apple Safari 4.0.4 for Windows
Apple Safari 4.0.4
Apple Safari 4.0.3 for Windows
Apple Safari 4.0.3
Apple Safari 4.0.2 for Windows
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 3.2.3 for Windows
Apple Safari 3.2.3
Apple Safari 3.2.2 for Windows
Apple Safari 3.1.2 for Windows
Apple Safari 3.1.2
Apple Safari 3.1.1 for Windows
Apple Safari 3.1.1
Apple Safari 3.0.4 Beta for Windows
Apple Safari 3.0.3 Beta for Windows
Apple Safari 3.0.3 Beta
Apple Safari 3.0.2 Beta for Windows
Apple Safari 3.0.2 Beta
Apple Safari 3.0.1 Beta for Windows
Apple Safari 3.0.1 Beta
Apple Safari 2.0.4
Apple Safari 2.0.3
Apple Safari 2.0.2
Apple Safari 2.0.1
Apple Safari 1.3.2
Apple Safari 1.3.1
Apple Safari 1.3
Apple Safari 1.2.3
Apple Safari 1.2.2
Apple Safari 1.2.1
Apple Safari 1.2
Apple Safari 1.1
Apple Safari 1.0
Apple Safari 6.0.1 for Windows
Apple Safari 6.0 for Windows
Apple Safari 6.0
Apple Safari 6 for OSX Lion
Apple Safari 5.34
Apple Safari 5.33
Apple Safari 5.31
Apple Safari 5.1.7 for Windows
Apple Safari 5.1.7
Apple Safari 5.1.6 for OSX Lion
Apple Safari 5.1.5 for Windows
Apple Safari 5.1.4 for Windows
Apple Safari 5.1.4
Apple Safari 5.1.1 for Windows
Apple Safari 5.1.1
Apple Safari 5.1 for Windows
Apple Safari 5.1
Apple Safari 5.0.6 for windows
Apple Safari 5.0.5 for Windows
Apple Safari 5.0.5
Apple Safari 5.0.4 for Windows
Apple Safari 5.0.4
Apple Safari 5.0.3 for Windows
Apple Safari 5.0.3
Apple Safari 5.0.2 for Windows
Apple Safari 5.0.2
Apple Safari 5.0.1 for Windows
Apple Safari 5.0.1
Apple Safari 5.0 for Windows
Apple Safari 5.0
Apple Safari 4.31
Apple Safari 4.30
Apple Safari 4.28
Apple Safari 4.1.3 for Windows
Apple Safari 4.1.3
Apple Safari 4.1.2
Apple Safari 4.1.1
Apple Safari 4.1
Apple Safari 4.0
Apple Safari 4 for Windows
Apple Safari 4 Beta
Apple Safari 4
Apple Safari 3.52
Apple Safari 3.2
Apple Safari 3.1 for Windows
Apple Safari 3.1
Apple Safari 3 Beta for Windows
Apple Safari 3 Beta
Apple Safari 3
8pecxstudios Cyberfox 25.0
8pecxstudios Cyberfox 24.0
8pecxstudios Cyberfox 23.0
8pecxstudios Cyberfox 22.0 Not Vulnerable: Oracle SPARC Enterprise M9000 XCP 1121
Oracle SPARC Enterprise M8000 XCP 1121
Oracle SPARC Enterprise M5000 XCP 1121
Oracle SPARC Enterprise M4000 XCP 1121
Oracle SPARC Enterprise M3000 XCP 1121
Oracle Fujitsu M10-4S Server XCP 2280
Oracle Fujitsu M10-4 Server XCP 2280
Oracle Fujitsu M10-1 Server XCP 2280
Mozilla SeaMonkey 2.22.1
Mozilla Firefox ESR 24.1.1
Mozilla Firefox ESR 17.0.11
Mozilla Firefox 25.0.1
Moonchild Productions Pale Moon 24.1.2
EMC RSA Validation Manager 3.2 Build 201
8pecxstudios Cyberfox 25.0.1


SecurityFocus Vulnerabilities

USN-3137-1: MoinMoin vulnerabilities | Ubuntu

Jump to site nav

  • Jump to content
  • Cloud
    • Overview
    • Ubuntu OpenStack
    • Public cloud
    • Cloud tools
    • Cloud management
    • Ecosystem
    • Cloud labs
  • Server
    • Overview
    • Server management
    • Hyperscale
  • Desktop
    • Overview
    • Features
    • For business
    • For developers
    • Take the tour
    • Desktop management
    • Ubuntu Kylin
  • Phone
    • Overview
    • Features
    • Scopes
    • App ecosystem
    • Operators and OEMs
    • Carrier Advisory Group
    • Ubuntu for Android
  • Tablet
    • Design
    • Operators and OEMs
    • App ecosystem
  • TV
    • Overview
    • Experience
    • Industry
    • Contributors
    • Features and specs
    • Commercial info
  • Management
    • Overview
    • Landscape features
    • Working with Landscape
    • Return on investment
    • Compliance
    • Ubuntu Advantage
  • Download
    • Overview
    • Cloud
    • Server
    • Desktop
    • Ubuntu Kylin
    • Alternative downloads


Ubuntu Security Notices

USN-3134-1: Python vulnerabilities | Ubuntu

Jump to site nav

  • Jump to content
  • Cloud
    • Overview
    • Ubuntu OpenStack
    • Public cloud
    • Cloud tools
    • Cloud management
    • Ecosystem
    • Cloud labs
  • Server
    • Overview
    • Server management
    • Hyperscale
  • Desktop
    • Overview
    • Features
    • For business
    • For developers
    • Take the tour
    • Desktop management
    • Ubuntu Kylin
  • Phone
    • Overview
    • Features
    • Scopes
    • App ecosystem
    • Operators and OEMs
    • Carrier Advisory Group
    • Ubuntu for Android
  • Tablet
    • Design
    • Operators and OEMs
    • App ecosystem
  • TV
    • Overview
    • Experience
    • Industry
    • Contributors
    • Features and specs
    • Commercial info
  • Management
    • Overview
    • Landscape features
    • Working with Landscape
    • Return on investment
    • Compliance
    • Ubuntu Advantage
  • Download
    • Overview
    • Cloud
    • Server
    • Desktop
    • Ubuntu Kylin
    • Alternative downloads


Ubuntu Security Notices

TeleCrypt, the file encryption ransomware that abuses Telegram API for communication, has had its encryption cracked just two weeks after the threat was originally detailed.

The ransomware abuses the instant messaging service Telegram for command and control (C&C) communications. What’s more, victims can send messages to the attackers using the same service. Immediately after infection, the malware creates a Telegram bot beacon to the C&C server to send various details about the compromised machine.

After installation, TeleCrypt searches the hard drive for specific files, then encrypts them and appends the .Xcri extension to them. However, security researchers say that some variations of the malware don’t change the file extension.

The ransomware’s authors would request around $ 75 from their victims to provide them with a decryptor (payments are accepted via Russian payment services Qiwi or Yandex.Money). Right from the start, however, researchers suggested that TeleCrypt was written by cybercriminals without advanced skills.

According to Malwarebytes Labs researchers, the encryption TeleCrypt uses isn’t very strong indeed. The security researchers have already managed to create a decryption tool that allows victims to recover their files without paying the attackers. The utility requires .NET to work and for users to provide the unencrypted version of one of the encrypted files.

“Telecrypt will generate a random string to encrypt the files that is between 10-20 length and only contain the letters vo,pr,bm,xu,zt,dq. Telecrypt encrypts files by looping through them a SINGLE byte at a time, and then simply adding a byte from the key in order. This simple encryption method allows a decryption application to be made,” Malwarebytes Labs explains.

Written in Delphi, the ransomware is being distributed via spam emails, exploits, and drive-by downloads, and targets only users in Russia at the moment. Both the ransom note and an executable with GUI that is downloaded and dropped onto the infected machines, are written in Russian.

Kaspersky Lab security researchers also managed to crack the ransomware’s encryption to help victims recover their files using a free decryption tool. Involved in the NoMoreRansom initiative, Kaspersky actually helps the victims of numerous other ransomware families decrypt their files.

Related: Fake ISP Complaint Emails Distribute Locky Ransomware Variant

Related: Ransoc Ransomware Blackmails Victims

Related: CryPy Ransomware Uses Unique Key for Each File

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Tags:


SecurityWeek RSS Feed

Michigan State University has announced on Friday that a university server and a database containing information on some 400,000 faculty, staff and students has been accessed by a unauthorised third party.

Michigan State University breach

The database contains names, social security numbers, MSU identification numbers, and in some cases, date of birth of faculty, staff and students who were employed by MSU between 1970 and Nov. 13, 2016, and students who attended MSU between 1991 and 2016.

“MSU’s Information Technology team rapidly determined the cause and nature of the breach, and the MSU Police Department is working diligently with federal law enforcement partners to investigate the crime,” the university said.

The database in question was taken offline in less than 24 hours after it was breached by the attacker, but not quickly enough to prevent him or her to access records of 449 individuals.

The university has already notified affected parties, and has offered them two years of identity theft protection, fraud recovery, and credit monitoring services, for free.

They also made sure to note that the database did not contain passwords, financial, academic, contact, gift or health information.

The breach happened on November 13.

Michigan State University spokesman Jason Cody told News 10 that the hacker(s) demanded money for the stolen information, but that the university did not pay.


Help Net Security

Dyn Confirms DDoS Attack Affecting Twitter, Github, Many Others

October 21, 2016 , 10:01 am

IoT Botnets Are The New Normal of DDoS Attacks

October 5, 2016 , 8:51 am

Leftover Factory Debugger Doubles as Android Backdoor

October 14, 2016 , 9:00 am

Threatpost News Wrap, November 18, 2016

November 18, 2016 , 9:15 am

iPhone Call History Synced to iCloud Without User Consent, Knowledge

November 17, 2016 , 1:51 pm

Microsoft Patches Zero Day Disclosed by Google

November 8, 2016 , 2:57 pm

Microsoft Says Russian APT Group Behind Zero-Day Attacks

November 1, 2016 , 5:50 pm

Google to Make Certificate Transparency Mandatory By 2017

October 29, 2016 , 6:00 am

Microsoft Extends Malicious Macro Protection to Office 2013

October 27, 2016 , 4:27 pm

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

October 25, 2016 , 3:00 pm

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

October 22, 2016 , 6:00 am

FruityArmor APT Group Used Recently Patched Windows Zero Day

October 20, 2016 , 7:00 am

Experts ‘Outraged’ by Warrant Demanding Fingerprints to Unlock Smartphones

October 18, 2016 , 4:58 pm

Researchers Break MarsJoke Ransomware Encryption

October 3, 2016 , 5:00 am

OpenSSL Fixes Critical Bug Introduced by Latest Update

September 26, 2016 , 10:45 am

500 Million Yahoo Accounts Stolen By State-Sponsored Hackers

September 22, 2016 , 3:47 pm

Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials

September 22, 2016 , 12:31 pm

Experts Want Transparency From Government’s Vulnerabilities Equities Process

September 20, 2016 , 2:41 pm

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

September 15, 2016 , 11:15 am

Generic OS X Malware Detection Method Explained

September 13, 2016 , 9:14 am

Patched Android Libutils Vulnerability Harkens Back to Stagefright

September 9, 2016 , 2:06 pm

Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017

September 8, 2016 , 3:43 pm

Threatpost News Wrap, September 2, 2016

September 2, 2016 , 9:00 am

Insecure Redis Instances at Core of Attacks Against Linux Servers

September 1, 2016 , 1:08 pm

Dropbox Forces Password Reset for Older Users

August 29, 2016 , 9:58 am

Cisco Begins Patching Equation Group ASA Zero Day

August 24, 2016 , 5:53 pm

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

August 24, 2016 , 8:00 am

Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

August 17, 2016 , 4:06 pm

Pokémon GO Spam, Ransomware, On the Rise

August 17, 2016 , 12:58 pm

ProjectSauron APT On Par With Equation, Flame, Duqu

August 8, 2016 , 1:40 pm

Miller, Valasek Deliver Final Car Hacking Talk

August 4, 2016 , 3:26 pm

Researchers Go Inside a Business Email Compromise Scam

August 4, 2016 , 10:00 am

Export-Grade Crypto Patching Improves

August 3, 2016 , 10:00 am

Kaspersky Lab Launches Bug Bounty Program

August 2, 2016 , 9:00 am

Threatpost News Wrap, July 29, 2016

July 29, 2016 , 10:45 am

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping

July 26, 2016 , 9:30 am

Upcoming Tor Design Battles Hidden Services Snooping

July 25, 2016 , 3:51 pm

EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers

July 21, 2016 , 1:18 pm

Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update

July 20, 2016 , 9:21 am

Threatpost News Wrap, July 15, 2016

July 15, 2016 , 11:00 am

Academics Build Early-Warning Ransomware Detection System

July 14, 2016 , 1:05 pm

xDedic Hacked Server Market Resurfaces on Tor Domain

July 12, 2016 , 11:40 am

Conficker Used in New Wave of Hospital IoT Device Attacks

June 30, 2016 , 11:48 am

655,000 Healthcare Records Being Sold on Dark Web

June 28, 2016 , 10:00 am

Windows Zero Day Selling for $ 90,000

May 31, 2016 , 5:44 pm

Millions of Stolen MySpace, Tumblr Credentials Being Sold Online

May 31, 2016 , 1:37 pm

OTR Protocol Patched Against Remote Code Execution Flaw

March 10, 2016 , 10:23 am

Facebook Debuts Open Source Detection Tool for Windows

September 27, 2016 , 12:24 pm

Serious Dirty Cow Linux Vulnerability Under Attack

October 21, 2016 , 11:21 am

Popular Android App Leaks Microsoft Exchange User Credentials

October 14, 2016 , 8:00 am

Cisco Warns of Critical Flaws in Nexus Switches

October 7, 2016 , 10:55 am

Free Tool Protects Mac Users from Webcam Surveillance

October 7, 2016 , 7:00 am


Threatpost | The first stop for security news

Security experts have long said that internet-connected systems and software need security controls and features built in by design, in the same manner they’re built into physical infrastructure. The National Institute of Standards and Technology agrees and has issued guidance to help software engineers build secure products.

Titled “Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems,” the guideline emphasizes incorporating “well-defined engineering-based security design principles at every level, from the physical to the virtual,” NIST Fellow Ron Ross wrote on the Taking Measure blog. A holistic approach does more than make systems penetration-resistant; even after a compromise, they’re still capable enough to contain the damage and resilient enough to keep supporting critical missions and business functions.

[ An InfoWorld exclusive: Go inside a security operations center. | Discover how to secure your systems with InfoWorld’s Security Report newsletter. ]

NIST’s guidance uses the international standard ISO/IEC/IEEE 15288 for systems and software engineering as a framework, and it maps out “every security activity that would help the engineers make a more trustworthy system” for each of the 30-plus processes defined by the standard. The activities cover the entire system lifecycle, from the initial business or mission analysis to requirements definition to the design and architecture phases, and they’re applicable for new, upgraded, or repurposed systems.

“We have a high degree of confidence our bridges and airplanes are safe and structurally sound. We trust those technologies because we know that they were designed and built by applying the basic laws of physics, principles of mathematics, and concepts of engineering,” Ross wrote. Similarly, applying fundamental principles in mathematics, computer science, and systems/software engineering can give us the same level of confidence in our software and hardware.

Taking a holistic approach

A holistic approach requires coordinating across different specialties, such as information, software and hardware assurance, physical security, antitamper protection, communications security, and cryptography. It also demands addressing multiple focus areas, such as privacy, verification, penetration resistance, architecture, performance, validation, and vulnerability.

The guidance addressed the dependencies and  subspecialties by grouping the processes in the system lifecycle into four families:

  • Agreement Process: Tasks related to acquiring products and services, as well as providing services as a supplier.
  • Organizational Project-Enabling Process: Lifecycle model management, infrastructure management, portfolio management, human resource management, quality management, and knowledge management.
  • Technical Management Process: Project planning, project assessment and control, decision management, risk management, configuration management, information management, and quality assurance.
  • Technical Process: All the activities related to business or mission analysis, defining stakeholder needs and requirements, defining system requirements, defining the architecture, defining the design, system analysis, implementation, integration, verification, transition, validation, operations, maintenance, and disposal.

The processes outlined in the publication do not prescribe a mandatory set of activities and do not explicitly map to specific stages in the lifecycle, NIST warned. Engineers should rely on their experience and their understanding of the organization’s objectives to tailor the processes to meet the stakeholder’s requirements for a trustworthy system.

The publication also did not attempt to formally define systems security engineering. There is something for everyone involved in the process, from business stakeholders to developers, administrators, and security analysts.

Calling on engineers

When civil engineers build a bridge, they have to consider the weight of vehicles and people crossing the bridge, the stress caused by wind and other natural elements, and the materials used to build the bridge itself. Buildings have to meet specific structural and fire codes to make sure they are safe and will not collapse. Similarly, software engineers need to build systems with security controls already included in the design and not added afterward as a separate component.

If bridges were routinely collapsing, scientists and engineers would be immediately on the scene to figure out what went wrong and identify how to fix it for future projects. Currently, instead of asking engineers and scientists to perform root-cause failure analysis to find and fix the problem, cybersecurity focuses on add-ons. Changing how technology is designed and built—by strengthening underlying systems and system components, and developing with well-defined security requirements—would help reduce the number of known, unknown, and adversary-created vulnerabilities, Ross said.

NIST’s approach echoes what Dan Kaminsky, chief scientist and co-founder of White Ops, said in his keynote speech at the Black Hat security conference earlier this year. Kaminsky called for an “NIH [National Institutes of Health] for Cyber” to study the security challenges and come up with engineering solutions addressing them. While Kaminsky was using the name of a different federal agency, his message was the same: Cybersecurity needs to be treated as an engineering discipline with tools and principles that can be used to build secure systems.

“We didn’t stop our cities from burning by making fire illegal or heal the ill by making sickness a crime. We actually studied the problems and learned to deliver safety,” Kaminsky said in his speech. “If we want to make security better, give people environments that are easy to work with and still secure.”

Addressing the IoT problem

While NIST focused the language on systems and software, the guidance provides a welcome direction for the internet of things, most of which hit the market with little to no security controls.

NIST’s authority extends to only government agencies and contractors, so the guidance is not binding for engineers working in the private sector. Even so, these recommendations can raise expectations on what features must be included to be acceptable for the marketplace.

This NIST publication is the culmination of nearly four years of work, Ross said. The final draft was originally expected in December, but the release date was moved up after a crippling distributed denial-of-service attack against Dyn temporarily cut off access to large parts of the internet. The attack also revived discussions on whether the government should try to regulate the security of IoT, especially since there are currently no consequences for manufacturers selling subpar devices to consumers.

Regulation would be difficult, as many of the embedded devices aren’t manufactured in the United States. “While I’m not taking a certain level of regulation off the board, the United States can’t regulate the world,” Rep. Greg Walden (R-Ore.), chairman of the Subcommittee on Communications and Technology said during a recent Congressional hearing on IoT security.

Building trustworthy systems

The rapid pace of technological innovation, the dramatic growth in consumer demand for new technology, and the boom in IoT have made it difficult to understand, let alone protect, the global information technology infrastructure. There are too many areas to cover—software, firmware, hardware components—and cyberhygiene efforts, such as patching, asset management, and vulnerability scanning, are not enough.

“Our fundamental cybersecurity problem can be summed up in three words—too much complexity,” Ross wrote. “Creating more trustworthy, secure systems requires a holistic view of the problems, the application of concepts, principles, and best practices of science and engineering to solve those problems, and the leadership and will to do the right thing—even when such actions may not be popular.”

To comment on this article and other InfoWorld content, visit InfoWorld's LinkedIn page, Facebook page and Twitter stream.


InfoWorld Security

The White House confirmed that the potential for election hacking led to using the special "red phone" to contact Russia eight days before the U.S. presidential election and issue a warning about influencing the process.

The original report said the White House used a secret "hotline"-style message on October 31st to clearly ask Russia to stop any cyberattacks that could undermine the election results. Anonymous White House officials told The Washington Post about the election hacking warning and said the Russian government response was "noncommittal." Even so, the officials said they hadn't seen an escalation in cyberattacks from Russia leading up to the election.

In a statement to The New York Times¸ the White House confirmed it had "contacted the Russian government directly regarding malicious cyberactivity" that was "targeting U.S. state election-related systems" using the Washington-Moscow Direct Communications Link connecting the Nuclear Risk Reduction Centers in both countries.

Cyberattacks attributed to Russia have been so plentiful this year that the White House previously admitted to considering "proportional response" to election hacking by the Russian government following attacks on voter registration systems and the Democratic National Committee. These attacks, as well as the breach of Clinton campaign chairman John Podesta's email account, were attributed to Russian hacker groups allegedly under orders by the Russian government.

Konstantinos Karagiannis, CTO of security consulting at BT America, said via Twitter that the leaks from these attacks likely prompted the warning.

Privacy Professor CEO Rebecca Herold said the leaks imply Russia's intent was likely to influence the election rather than perform direct election hacking. But, she said the White House's warning may been aimed at stopping more leaks in the lead-up to the election.

"It is likely Russia had just as much information, emails, and databases from the Republicans as they did for the Democrats (reports indicated the GOP systems were just as weak and vulnerable as the DNC's were), but chose to only release select information about the DNC, Clinton, and others, and possibly use it in other ways as well, to influence voters," Herold told SearchSecurity via email.

FBI Director James Comey said in September that state voter registration systems had been targeted by malicious actors and the Department of Homeland Security offered to help states to make sure systems were protected against potential election hacking. However, Comey also assured the public that the presidential election itself would be "very, very hard for someone to hack into because it's so clunky and dispersed."

Herold agreed that hacking of any election system was unlikely but Russia's attacks on voter registration databases would have provided "such things as voting histories, political group memberships, cause group memberships, addresses, polling and survey results, etc."

"It is feasible for such data to be run through big data analytics to determine the topics for which the voting population groups would have the most concerns, and thus the topics and/or specific types of hacked information that could be publicized with regard to each of the candidates to potentially help sway the voters to switch votes to the other candidate, or to even kill their motivation to even vote at all," Herold said. "If Russia had such data, and wanted to use it to try and make one candidate look bad, the other good, etc., that is how they would be viewed as influencing, or 'hacking' the election."

Next Steps

Learn how predictive modeling and forecasting failed to pick the election winner.

Find out why experts feared voting machine hacks during the general election.

Get info on the president-elect being silent on cybersecurity.

PRO+

Content

Find more PRO+ content and other member only offers, here.


SearchSecurity: Security Wire Daily News

Application: SAP NetWeaver AS ABAP

Versions Affected: SAP NetWeaver AS ABAP 7.4

Vendor URL: http://SAP.com

Bugs: Directory traversal

Sent: 22.04.2016

Reported: 23.04.2016

Vendor response: 23.04.2016

Date of Public Advisory: 09.08.2016

Reference: SAP Security Note 2312966

Author: Daria Prosochkina (ERPScan)

Description

1. ADVISORY INFORMATION

Title: [ERPSCAN-16-031] SAP NetWeaver AS ABAP a directory traversal
using READ DATASET

Advisory ID: [ERPSCAN-16-031]

Risk: high

Advisory URL: https://erpscan.com/advisories/erpscan-16-031-sap-netweaver-abap-directory-traversal-via-using-read-dataset/

Date published: 11.11.2016

Vendors contacted: SAP

2. VULNERABILITY INFORMATION

Class: Directory traversal

Impact: read file from system

Remotely Exploitable: yes

Locally Exploitable: yes

CVSS Information

CVSS Base Score v3: 4.3 / 10

CVSS Base Vector:

AV : Attack Vector (Related exploit range) Network (N)

AC : Attack Complexity (Required attack complexity) Low (L)

PR : Privileges Required (Level of privileges needed to exploit) Low (L)

UI : User Interaction (Required user participation) None (N)

S : Scope (Change in scope due to impact caused to components beyond
the vulnerable component) Unchanged (U)

C : Impact to Confidentiality Low (L)

I : Impact to Integrity None (N)

A : Impact to Availability None (N)

3. VULNERABILITY DESCRIPTION

The code provides access to the file specified after the READ DATASET
statement. The variable transmitted to the input of the statement is
entered in it by user input. Thus, the user can access the files
stored on the operating system. This vulnerability is called a
Directory Traversal.

The attack is possible if the application does not check the user data
and does not delete special characters used for a directory traversal
attack from the variable, in which the filename is passed. As a
result, an attacker can read data from all files, to which the
application has access.

To discover this vulnerability, data flow analysis and other unique
techniques are used.

4. VULNERABLE PACKAGES

SAP_ABA 700

SAP_ABA 701

SAP_ABA 702

SAP_ABA 710

SAP_ABA 711

SAP_ABA 730

SAP_ABA 731

SAP_ABA 740

SAP_ABA 750

SAP_ABA 751

SAP_ABA 75A

SAP_ABA 75B

5. SOLUTIONS AND WORKAROUNDS

To correct this vulnerability, install SAP Security Note 2312966

6. AUTHOR

Daria Prosochkina (ERPScan)

7. TECHNICAL DESCRIPTION

Attacker can read any file from OS with use BUPA_BIP_FILE_IMPORT program.

Filename used in statement READ DATASET (line 428) is entered in this
statement by user input. User can pass to input arbitrary filepath,
for example /etc/passwd. As a result of execution of the
BUPA_BIP_FILE_IMPORT program, data from /etc/passwd will be written in
P_FLEN variable in hex format.

Vulnerable code

426. p_flen = 0.

427. DO.

428. READ DATASET p_ifilea INTO lw.

429.* Exit conditions for accessing in a loop

430. IF sy-subrc NE 0. EXIT. ENDIF.

431. APPEND lw TO p_itab .

432.

433. p_flen = p_flen + XSTRLEN( lw-d ) .

434. ENDDO.

8. REPORT TIMELINE

Sent: 22.04.2016

Reported: 23.04.2016

Vendor response: 23.04.2016

Date of Public Advisory: 09.08.2016

9. REFERENCES

[ERPSCAN-16-031] SAP NetWeaver AS ABAP – Directory traversal using READ DATASET

10. ABOUT ERPScan Research

ERPScan research team specializes in vulnerability research and
analysis of critical enterprise applications. It was acknowledged
multiple times by the largest software vendors like SAP, Oracle,
Microsoft, IBM, VMware, HP for discovering more than 400
vulnerabilities in their solutions (200 of them just in SAP!).

ERPScan researchers are proud of discovering new types of
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and of the "The
Best Server-Side Bug" nomination at BlackHat 2013.

ERPScan experts participated as speakers, presenters, and trainers at
60+ prime international security conferences in 25+ countries across
the continents ( e.g. BlackHat, RSA, HITB) and conducted private
trainings for several Fortune 2000 companies.

ERPScan researchers carry out the EAS-SEC project that is focused on
enterprise application security awareness by issuing annual SAP
security researches.

ERPScan experts were interviewed in specialized info-sec resources and
featured in major media worldwide. Among them, there are Reuters,
Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise,
Chinabyte, etc.

Our team consists of highly-qualified researchers, specialized in
various fields of cybersecurity (from web application to ICS/SCADA
systems), gathering their experience to conduct the best SAP security
research.

11. ABOUT ERPScan

ERPScan is the most respected and credible Business Application
Cybersecurity provider. Founded in 2010, the company operates globally
and enables large Oil and Gas, Financial, Retail and other
organizations to secure their mission-critical processes. Named as an
aEmerging Vendora in Security by CRN, listed among aTOP 100 SAP
Solution providersa and distinguished by 30+ other awards, ERPScan is
the leading SAP SE partner in discovering and resolving security
vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to
assist in improving the security of their latest solutions.

ERPScanas primary mission is to close the gap between technical and
business security and provide solutions for CISO's to evaluate and
secure SAP and Oracle ERP systems and business-critical applications
from both cyberattacks and internal fraud. As a rule, our clients are
large enterprises, Fortune 2000 companies and MSPs, whose requirements
are to actively monitor and manage security of vast SAP and Oracle
landscapes on a global scale.

We afollow the suna and have two hubs, located in Palo Alto and
Amsterdam, to provide threat intelligence services, continuous support
and to operate local offices and partner network spanning 20+
countries around the globe.

Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301

Phone: 650.798.5255

Twitter: @erpscan


Exploit Files ≈ Packet Storm