U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-6271

Change History

Modified Analysis by NIST 7/24/2024 12:47:47 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 9.3.67.5r1
          *cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:* versions from (including) 10 up to (excluding) 10.1.129.11r1
          *cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:* versions from (including) 10.5 up to (excluding) 10.5.52.11r1
     OR
          cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (including) 6.4.0
     OR
          cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 7.1.0.11
          *cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 7.1.0.11
          *cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:* versions from (including) 3.8.0.0 up to (excluding) 3.8.0.07
          *cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:* versions from (including) 3.9.1.0 up to (excluding) 3.9.1.08
          *cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:* versions from (including) 4.1.2.0 up to (excluding) 4.1.2.06
     OR
          cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:* versions from (including) 3.8.0.0 up to (excluding) 3.8.0.07
          *cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:* versions from (including) 3.9.1.0 up to (excluding) 3.9.1.08
          *cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:* versions from (including) 4.1.2.0 up to (excluding) 4.1.2.06
     OR
          cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:* versions from (including) 3.8.0.0 up to (excluding) 3.8.0.07
          *cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:* versions from (including) 3.9.1.0 up to (excluding) 3.9.1.08
          *cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:* versions from (including) 4.1.2.0 up to (excluding) 4.1.2.06
     OR
          cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 7.1.0.11
          *cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 7.1.0.11
          *cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 7.1.0.11
          *cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (excluding) 1.4.3.5
          *cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 1.5.0.0 up to (excluding) 1.5.0.4
          *cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.2.0.0 up to (excluding) 7.2.0.9
          *cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3.0.0 up to (excluding) 7.3.0.7
     OR
          cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:* versions up to (excluding) r77.30
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 11.3.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 11.4.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 11.3.0 up to (including) 11.5.1
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.4.1
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (including) 4.4.0
     *cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* versions from (including) 4.2.0 up to (including) 4.4.0
     *cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (including) 4.4.0
     *cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* versions from (including) 2.1.0 up to (including) 2.3.0
     *cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (including) 3.1.1
     *cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (including) 4.0.5
     *cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:* versions up to (including) 4.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:* versions from (including) 1.0.0.0 up to (including) 1.0.0.4
     *cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:* versions from (including) 1.1.0.0 up to (including) 1.1.0.4
     *cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*
     *cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*
     *cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:* versions up to (excluding) 1.2.1
     *cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:openflow:*:*:* versions up to (excluding) 1.2.1
     *cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:vmware:*:*:* versions up to (excluding) 1.2.1
     *cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:* versions from (including) 3.1.0 up to (including) 3.1.0.7
     *cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
     *cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
     *cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
     *cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
     *cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
     *cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (excluding) 10.10.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.9.0 up to (excluding) 4.9.12
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.10.0 up to (excluding) 4.10.9
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.11.0 up to (excluding) 4.11.11
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.12.0 up to (excluding) 4.12.9
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.13.0 up to (excluding) 4.13.9
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.14.0 up to (excluding) 4.14.4f
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
     *cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions up to (excluding) 4.1.1
     *cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
     *cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*

								
						
Changed Reference Type
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html Third Party Advisory
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html Broken Link, Third Party Advisory
Changed Reference Type
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html Third Party Advisory
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html Exploit, Issue Tracking, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141216207813411&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141216207813411&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141216668515282&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141216668515282&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141235957116749&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141235957116749&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141319209015420&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141319209015420&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141330425327438&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141330425327438&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141330468527613&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141330468527613&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141345648114150&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141345648114150&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383026420882&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383026420882&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383081521087&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383081521087&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383138121313&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383138121313&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383196021590&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383196021590&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383244821813&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383244821813&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383304022067&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383304022067&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383353622268&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383353622268&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141383465822787&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383465822787&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141450491804793&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141450491804793&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141576728022234&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141576728022234&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141577137423233&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577137423233&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141577241923505&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577241923505&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141577297623641&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577297623641&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141585637922673&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141585637922673&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141694386919794&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141694386919794&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=141879528318582&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141879528318582&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142113462216480&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142113462216480&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142118135300698&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142118135300698&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142358026505815&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358026505815&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142358078406056&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358078406056&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142546741516006&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142546741516006&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142719845423222&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142719845423222&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142721162228379&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142721162228379&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=142805027510172&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142805027510172&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://secunia.com/advisories/58200 Third Party Advisory
http://secunia.com/advisories/58200 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59272 Third Party Advisory
http://secunia.com/advisories/59272 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59737 Third Party Advisory
http://secunia.com/advisories/59737 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59907 Third Party Advisory
http://secunia.com/advisories/59907 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60024 Third Party Advisory
http://secunia.com/advisories/60024 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60034 Third Party Advisory
http://secunia.com/advisories/60034 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60044 Third Party Advisory
http://secunia.com/advisories/60044 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60055 Third Party Advisory
http://secunia.com/advisories/60055 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60063 Third Party Advisory
http://secunia.com/advisories/60063 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60193 Third Party Advisory
http://secunia.com/advisories/60193 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60325 Third Party Advisory
http://secunia.com/advisories/60325 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60433 Third Party Advisory
http://secunia.com/advisories/60433 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/60947 Third Party Advisory
http://secunia.com/advisories/60947 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61065 Third Party Advisory
http://secunia.com/advisories/61065 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61128 Third Party Advisory
http://secunia.com/advisories/61128 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61129 Third Party Advisory
http://secunia.com/advisories/61129 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61188 Third Party Advisory
http://secunia.com/advisories/61188 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61283 Third Party Advisory
http://secunia.com/advisories/61283 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61287 Third Party Advisory
http://secunia.com/advisories/61287 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61291 Third Party Advisory
http://secunia.com/advisories/61291 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61312 Third Party Advisory
http://secunia.com/advisories/61312 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61313 Third Party Advisory
http://secunia.com/advisories/61313 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61328 Third Party Advisory
http://secunia.com/advisories/61328 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61442 Third Party Advisory
http://secunia.com/advisories/61442 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61471 Third Party Advisory
http://secunia.com/advisories/61471 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61485 Third Party Advisory
http://secunia.com/advisories/61485 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61503 Third Party Advisory
http://secunia.com/advisories/61503 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61542 Third Party Advisory
http://secunia.com/advisories/61542 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61547 Third Party Advisory
http://secunia.com/advisories/61547 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61550 Third Party Advisory
http://secunia.com/advisories/61550 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61552 Third Party Advisory
http://secunia.com/advisories/61552 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61565 Third Party Advisory
http://secunia.com/advisories/61565 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61603 Third Party Advisory
http://secunia.com/advisories/61603 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61633 Third Party Advisory
http://secunia.com/advisories/61633 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61641 Third Party Advisory
http://secunia.com/advisories/61641 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61643 Third Party Advisory
http://secunia.com/advisories/61643 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61654 Third Party Advisory
http://secunia.com/advisories/61654 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61676 Third Party Advisory
http://secunia.com/advisories/61676 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61700 Third Party Advisory
http://secunia.com/advisories/61700 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61703 Third Party Advisory
http://secunia.com/advisories/61703 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61711 Third Party Advisory
http://secunia.com/advisories/61711 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61715 Third Party Advisory
http://secunia.com/advisories/61715 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61780 Third Party Advisory
http://secunia.com/advisories/61780 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61816 Third Party Advisory
http://secunia.com/advisories/61816 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61855 Third Party Advisory
http://secunia.com/advisories/61855 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61857 Third Party Advisory
http://secunia.com/advisories/61857 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/61873 Third Party Advisory
http://secunia.com/advisories/61873 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/62228 Third Party Advisory
http://secunia.com/advisories/62228 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/62312 Third Party Advisory
http://secunia.com/advisories/62312 Broken Link, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/62343 Third Party Advisory
http://secunia.com/advisories/62343 Broken Link, Third Party Advisory
Changed Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Broken Link, Third Party Advisory
Changed Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Broken Link, Third Party Advisory
Changed Reference Type
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Broken Link, Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2014/dsa-3032 Third Party Advisory
http://www.debian.org/security/2014/dsa-3032 Mailing List, Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Broken Link, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/533593/100/0/threaded Third Party Advisory, VDB Entry
http://www.securityfocus.com/archive/1/533593/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/70103 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/70103 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 Third Party Advisory
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 Broken Link, Third Party Advisory
Changed Reference Type
https://access.redhat.com/articles/1200223 Third Party Advisory
https://access.redhat.com/articles/1200223 Exploit, Third Party Advisory
Changed Reference Type
https://access.redhat.com/node/1200223 Third Party Advisory
https://access.redhat.com/node/1200223 Exploit, Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1141597 Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1141597 Issue Tracking, Patch
Changed Reference Type
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Broken Link, Third Party Advisory
Changed Reference Type
https://kb.bluecoat.com/index?page=content&id=SA82 Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA82 Broken Link, Third Party Advisory
Changed Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Broken Link, Third Party Advisory
Changed Reference Type
https://support.citrix.com/article/CTX200223 Third Party Advisory
https://support.citrix.com/article/CTX200223 Permissions Required
Changed Reference Type
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Broken Link, Third Party Advisory
Changed Reference Type
https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 No Types Assigned
https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 Third Party Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/34879/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/34879/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/37816/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/37816/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/38849/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/38849/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/40619/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/40619/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/40938/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/40938/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/42938/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/42938/ Exploit, Third Party Advisory, VDB Entry