Vulnerability Name: CVE-2006-5201 (CCN-28755) Assigned: 2006-09-05 Published: 2006-09-05 Updated: 2019-07-31 Summary: Multiple packages on Sun Solaris, including (1) NSS; (2) Java JDK and JRE 5.0 Update 8 and earlier, SDK and JRE 1.4.x up to 1.4.2_12, and SDK and JRE 1.3.x up to 1.3.1_19; (3) JSSE 1.0.3_03 and earlier; (4) IPSec/IKE; (5) Secure Global Desktop; and (6) StarOffice, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents these products from correctly verifying X.509 and other certificates that use PKCS #1. CVSS v3 Severity: 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P )3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N )1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-Other Vulnerability Consequences: Bypass Security References: Source: CCN Type: BugTraq Mailing List, Thu Sep 14 2006 - 04:01:28 CDTSIP over TLS: X.509 peer authentication vulnerability in Ingate products Source: CCN Type: Full-Disclosure Mailing List, Tue Sep 5 15:22:20 BST 2006 [SECURITY] OpenSSL 0.9.8c and 0.9.7k released Source: CCN Type: Full-Disclosure Mailing List, Mon Jan 08 2007 - 20:17:36 CSTVMware ESX server security updates Source: MITRE Type: CNACVE-2006-4339 Source: MITRE Type: CNACVE-2006-5201 Source: MITRE Type: CNACVE-2006-5484 Source: MITRE Type: CNACVE-2007-5810 Source: CCN Type: Apple Security Update 2006-007About the security content of Security Update 2006-007 Source: CCN Type: Apple Web siteAbout the security content of Java Release 6 for Mac OS X 10.4 Source: CCN Type: NetBSD-SA2006-023OpenSSL RSA Signature Forgery Source: CCN Type: HP Security Bulletin HPSBUX02219 SSRT061273HP-UX Running BIND, Remote Denial of Service (DoS) Source: CCN Type: HP Security Bulletin HPSBMA02250 SSRT061275 rev.1HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS) Source: CCN Type: RHSA-2006-0661openssl security update Source: CCN Type: RHSA-2007-0062Critical: java-1.4.2-ibm security update Source: CCN Type: RHSA-2007-0072Critical: IBMJava2 security update Source: CCN Type: RHSA-2007-0073Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2008-0264Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: RHSA-2008-0525Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: RHSA-2008-0629Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: SA21709OpenSSL RSA Signature Forgery Vulnerability Source: CCN Type: SA21846OpenVPN OpenSSL RSA Signature Forgery Source: CCN Type: SA21870Avaya Products OpenSSL Vulnerability Source: CCN Type: SA21906Mozilla Firefox Multiple Vulnerabilities Source: CCN Type: SA21930Ingate Firewall and SIParator OpenSSL Vulnerability Source: CCN Type: SA21982Opera SSL RSA Signature Forgery Vulnerability Source: CCN Type: SA22204Sun Java JDK / SDK RSA Signature Forgery Vulnerability Source: SECUNIA Type: Patch, Third Party Advisory22204 Source: CCN Type: SA22226Sun Solaris RSA Signature Forgery Vulnerability Source: SECUNIA Type: Third Party Advisory22226 Source: CCN Type: SA22232OpenVPN Multiple Vulnerabilities Source: CCN Type: SA22284Serv-U FTP Server OpenSSL Multiple Vulnerabilities Source: CCN Type: SA22325Sun Secure Global Desktop Software RSA Signature Forgery Vulnerability Source: SECUNIA Type: Third Party Advisory22325 Source: CCN Type: SA22350SSH Tectia Products RSA Signature Forgery Vulnerability Source: CCN Type: SA22513Reflection Products RSA Signature Forgery Vulnerability Source: CCN Type: SA22523IBM HMC Apache2 / OpenSSL Vulnerabilities Source: CCN Type: SA22545Blue Coat Products RSA Signature Vulnerability Source: CCN Type: SA22585Sun JES / Solaris OpenSSL RSA Signature Forgery Source: CCN Type: SA22671BIND OpenSSL Vulnerabilities Source: CCN Type: SA22711Juniper Secure Access / Unified Access Control RSA Signature Forgery Source: CCN Type: SA22733Sun Java System Multiple Products RSA Signature Forgery Source: CCN Type: SA22758Cisco Products OpenSSL Vulnerabilities Source: CCN Type: SA22799Cisco Products OpenSSL Vulnerabilities Source: CCN Type: SA22934Sybase Afaria RSA Signature Forgery Source: CCN Type: SA22936Sybase Mach Desktop RSA Signature Forgery Source: CCN Type: SA22937Sybase mFolio RSA Signature Forgery Source: CCN Type: SA22938Sybase PowerBuilder RSA Signature Forgery Source: CCN Type: SA22939Sybase RFID Enterprise RSA Signature Forgery Source: CCN Type: SA22940Sybase Unwired Accelerator RSA Signature Forgery Source: CCN Type: SA22949Sybase Enterprise Portal RSA Signature Forgery Source: CCN Type: SA22992Avaya CMS Sun Solaris X Display Manager Security Issue Source: SECUNIA Type: Third Party Advisory22992 Source: CCN Type: SA23155Mac OS X Security Update Fixes Multiple Vulnerabilities Source: CCN Type: SA23455Sun Solaris WAN Boot RSA Signature Forgery Vulnerability Source: CCN Type: SA23680VMWare ESX Server Multiple Vulnerabilities Source: CCN Type: SA23794Oracle Products Multiple Vulnerabilities Source: CCN Type: SA23841SecureCRT / SecureFX OpenSSL RSA Signature Forgery Source: CCN Type: SA24930HP Tru64 UNIX Multiple SSL and BIND Vulnerabilities Source: CCN Type: SA24950HP Insight Management Agents SSL Vulnerabilities Source: CCN Type: SA25284BEA Products Multiple Vulnerabilities Source: CCN Type: SA25399Novell International Cryptographic Infrastructure Two Vulnerabilities Source: CCN Type: SA26329HP System Management Homepage Apache and OpenSSL Vulnerabilities Source: CCN Type: SA26893rPath update for openssl Source: CCN Type: SA27421Hitachi Web Server Multiple Vulnerabilities Source: CCN Type: SA28115Mac OS X Java Multiple Vulnerabilities Source: CCN Type: SA29412VMware Server Multiple Vulnerabilities Source: CCN Type: SA38567OpenOffice.org 2 Multiple Vulnerabilities Source: CCN Type: SA38568OpenOffice.org 3 Multiple Vulnerabilities Source: CCN Type: SA41818Oracle Open Office Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1016791OpenSSL RSA Signatures Can Be Forged Source: CCN Type: SECTRACK ID: 1017060(SSH Issues Fix for Tectia Server) OpenSSL RSA Signatures Can Be Forged Source: CCN Type: SECTRACK ID: 1017061(SSH Issues Fix for Tectia Manager) OpenSSL RSA Signatures Can Be Forged Source: CCN Type: SECTRACK ID: 1017522Oracle Database and Other Products Have 52 Unspecified Vulnerabilities With Unspecified Impact Source: CCN Type: Sun Alert ID: 102648Security Vulnerability in RSA Signature Verification Impacting Multiple SUN Products Source: SUNALERT Type: Broken Link102648 Source: CCN Type: Sun Alert ID: 102656Security Vulnerability Issue of Forged RSA Signatures for Java Enterprise System and Solaris Source: CCN Type: Sun Alert ID: 102657Security Vulnerability With RSA Signature Affects the Sun Secure Global Desktop Software Source: SUNALERT Type: Broken Link102657 Source: CCN Type: Sun Alert ID: 102686Security Vulnerability in RSA Signature Verification Affects Java 2 Platform, Standard Edition Source: CCN Type: Sun Alert ID: 102696A Security Vulnerability in RSA Signature Verification Affects Sun Java System Application Server, Proxy Server and Web Server Source: CCN Type: Sun Alert ID: 102722Security Vulnerability With RSA Signature Affects Solaris Applications Utilizing the libike Library Source: CCN Type: Sun Alert ID: 102744Security Vulnerability With RSA Signatures Affects OpenSSL Shipped With Solaris Source: CCN Type: Sun Alert ID: 102759Security Vulnerability With RSA Signatures Affects Solaris WAN Boot Source: CCN Type: ASA-2006-188openssl security update (RHSA-2006-0661) Source: CCN Type: ASA-2006-241HP-UX VirtualVault Vulnerabilities Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2006-250.htm Source: CCN Type: ASA-2006-250Sun Alert Notifications from Sun Weekly Report dated October 07 2006 Source: CCN Type: ASA-2006-251Sun Alert Notifications from Sun Weekly Report dated Oct 28 2006 Source: CCN Type: ASA-2006-264Security Vulnerability With RSA Signature Affects Solaris Applications Utilizing the libike Library Source: CCN Type: ASA-2006-266Security Vulnerability With RSA Signatures Affects OpenSSL Shipped With Solaris 10 Source: CCN Type: ASA-2007-090IBMJava2 security update (RHSA-2007-0072) Source: CCN Type: ASA-2007-091java-1.4.2-ibm security update (RHSA-2007-0062) Source: CCN Type: ASA-2007-093java-1.5.0-ibm security update (RHSA-2007-0073) Source: CCN Type: ASA-2007-097HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153) Source: CCN Type: ASA-2007-240HP-UX Running BIND Remote Denial of Service (DoS) (HPSBUX02219) Source: CCN Type: cisco-sr-20061108-opensslCisco Security Response: Multiple Vulnerabilities in OpenSSL Library Source: DEBIAN Type: DSA-1173openssl -- cryptographic weakness Source: DEBIAN Type: DSA-1174openssl096 -- cryptographic weakness Source: CCN Type: GLSA-200609-05OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery Source: CCN Type: GLSA-200609-18Opera: RSA signature forgery Source: CCN Type: GLSA-200610-06Mozilla Network Security Service (NSS): RSA signature forgery Source: CCN Type: Hitachi Security Vulnerability Information HS07-034Vulnerability in Hitachi Web Server Function for Authenticating SSL Clients Source: CCN Type: US-CERT VU#845620Multiple RSA implementations fail to properly handle signatures Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#845620 Source: CCN Type: MFSA 2006-60RSA Signature Forgery Source: CCN Type: OpenOffice Web SiteSecurity Vulnerability in OpenOffice.org resulting from 3rd party libraries Source: CCN Type: OpenPKG-SA-2006.018OpenSSL Source: CCN Type: OpenPKG-SA-2006.029BIND Source: CCN Type: OpenSSL Web siteOpenSSL:The Open Source toolkit for SSL/TLS Source: CCN Type: OpenSSL Security Advisory [5th September 2006]RSA Signature Forgery (CVE-2006-4339) Source: CCN Type: OSVDB ID: 28549OpenSSL RSA Key PKCS #1 v1.5 Signature Forgery Source: CCN Type: OSVDB ID: 30166Sun ONE/Java System Web Server NSS Unspecified Remote DoS Source: CCN Type: OSVDB ID: 42026Hitachi Web Server SSL Client Certification Validation Weakness Source: CCN Type: BID-19849OpenSSL PKCS Padding RSA Signature Forgery Vulnerability Source: CCN Type: BID-22083Oracle January 2007 Security Update Multiple Vulnerabilities Source: CCN Type: BID-26271Hitachi Web Server HTML Injection Vulnerability and Signature Forgery Vulnerability Source: CCN Type: BID-28276VMware Server 1.0.5 and Workstation 6.0.3 Multiple Vulnerabilities Source: CCN Type: TLSA-2006-29Multiple RSA implementations fail Source: CCN Type: USN-339-1OpenSSL vulnerability Source: CCN Type: VMware Server Web siteKey Features in VMware Server, What's New in Version 1.0.5 Source: CCN Type: Vmware Workstation Web siteVMware Workstation 6.0 Release Notes, New in Version 6.0.3 Source: VUPEN Type: Permissions RequiredADV-2006-3898 Source: VUPEN Type: Permissions RequiredADV-2006-3899 Source: VUPEN Type: Permissions RequiredADV-2006-3960 Source: XF Type: UNKNOWNopenssl-rsa-security-bypass(28755) Source: CCN Type: Novell Security Alert 3590033Security Vulnerability: Multiple RSA implementations fail to properly handle signatures Source: CCN Type: BEA07-169.00WebLogic SSL may verify RSA Signatures incorrectly if the RSA key exponent is 3 Source: SUSE Type: SUSE-SA:2006:055PKCS RSA signature forgery Source: SUSE Type: SUSE-SA:2006:061opera security problems Source: SUSE Type: SUSE-SA:2007:010IBMJava security update Source: SUSE Type: SUSE-SR:2006:024SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2006:026SUSE Security Summary Report Source: CCN Type: IBM Systems Support Web siteSupport for HMC Vulnerable Configuration: Configuration 1 :cpe:/a:sun:nss:*:*:*:*:*:*:*:* OR cpe:/a:sun:secure_global_desktop:*:*:*:*:*:*:*:* OR cpe:/a:sun:staroffice:*:*:*:*:*:*:*:* Configuration 2 :cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:* OR cpe:/o:sun:solaris:10.0:*:*:*:*:sparc:*:* OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:* Configuration 3 :cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* Configuration 4 :cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_03:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_19:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* Configuration 5 :cpe:/a:sun:sdk:1.3.1:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_19:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* Configuration 6 :cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_01:*:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_02:*:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_03:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7h:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7i:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.7j:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.8:*:*:*:*:*:*:* OR cpe:/a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* AND cpe:/o:sun:solaris:::x86:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:*:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:* OR cpe:/h:cisco:ids:-:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/a:sun:one_web_server:6.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:* OR cpe:/a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:* OR cpe:/a:cisco:ciscoworks_common_management_foundation:-:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:9::x86:*:*:*:*:* OR cpe:/a:cisco:access_registrar:*:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_01:*:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_02:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1::as:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:* OR cpe:/h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:* OR cpe:/h:cisco:gss_4491_global_site_selector:*:*:*:*:*:*:*:* OR cpe:/a:cisco:secure_access_control_server:*:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.1:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:3.0:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/a:sun:java_system_web_server:6.1:*:*:*:*:*:*:* OR cpe:/h:cisco:callmanager_express:-:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1::ws:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:* OR cpe:/a:sun:java_system_application_server:8.1:*:*:*:*:*:*:* OR cpe:/h:cisco:mds_9500:-:*:*:*:*:*:*:* OR cpe:/h:cisco:ons_15454:*:*:*:*:*:*:*:* OR cpe:/a:cisco:unified_presence_server:*:*:*:*:*:*:*:* OR cpe:/h:cisco:application_control_engine_module:1.1:*:*:*:*:*:*:* OR cpe:/a:cisco:wide_area_application_services:-:*:*:*:*:*:*:* OR cpe:/a:cisco:ciscoworks_common_services:-:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:4.0:beta:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:* OR cpe:/a:cisco:security_agent:5.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/a:cisco:unified_callmanager:4.1:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:* OR cpe:/a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update16:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update18:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update19:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jsse:1.0.3_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_19:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.3:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.4:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update17:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* Denotes that component is vulnerable BACK
sun nss *
sun secure global desktop *
sun staroffice *
sun solaris 9.0
sun solaris 10.0
sun sunos 5.8
sun jdk 1.5.0 -
sun jdk 1.5.0 update1
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update7_b03
sun jdk 1.5.0 update8
sun jre 1.3.1 -
sun jre 1.3.1_2
sun jre 1.3.1_03
sun jre 1.3.1_04
sun jre 1.3.1_05
sun jre 1.3.1_06
sun jre 1.3.1_07
sun jre 1.3.1_08
sun jre 1.3.1_09
sun jre 1.3.1_10
sun jre 1.3.1_11
sun jre 1.3.1_12
sun jre 1.3.1_13
sun jre 1.3.1_14
sun jre 1.3.1_15
sun jre 1.3.1_16
sun jre 1.3.1_17
sun jre 1.3.1_18
sun jre 1.3.1_19
sun jre 1.4.2 -
sun jre 1.4.2_1
sun jre 1.4.2_2
sun jre 1.4.2_3
sun jre 1.4.2_4
sun jre 1.4.2_5
sun jre 1.4.2_6
sun jre 1.4.2_7
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.5.0 -
sun jre 1.5.0 update1
sun jre 1.5.0 update2
sun jre 1.5.0 update3
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun sdk 1.3.1
sun sdk 1.3.1_01
sun sdk 1.3.1_01a
sun sdk 1.3.1_02
sun sdk 1.3.1_03
sun sdk 1.3.1_04
sun sdk 1.3.1_05
sun sdk 1.3.1_06
sun sdk 1.3.1_07
sun sdk 1.3.1_08
sun sdk 1.3.1_09
sun sdk 1.3.1_10
sun sdk 1.3.1_11
sun sdk 1.3.1_12
sun sdk 1.3.1_13
sun sdk 1.3.1_14
sun sdk 1.3.1_15
sun sdk 1.3.1_16
sun sdk 1.3.1_17
sun sdk 1.3.1_18
sun sdk 1.3.1_19
sun sdk 1.4.2
sun sdk 1.4.2_1
sun sdk 1.4.2_2
sun sdk 1.4.2_3
sun sdk 1.4.2_4
sun sdk 1.4.2_5
sun sdk 1.4.2_6
sun sdk 1.4.2_7
sun sdk 1.4.2_8
sun sdk 1.4.2_9
sun sdk 1.4.2_10
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun jsse 1.0.3
sun jsse 1.0.3_01
sun jsse 1.0.3_02
sun jsse 1.0.3_03
openssl openssl 0.9.7a
openssl openssl 0.9.7
openssl openssl 0.9.7b
openssl openssl 0.9.7c
openssl openssl 0.9.8a
openssl openssl 0.9.7 beta1
openssl openssl 0.9.7 beta2
openssl openssl 0.9.7 beta3
openssl openssl 0.9.7 beta4
openssl openssl 0.9.7 beta5
openssl openssl 0.9.7 beta6
openssl openssl 0.9.7d
openssl openssl 0.9.7e
openssl openssl 0.9.7f
openssl openssl 0.9.7g
openssl openssl 0.9.7h
openssl openssl 0.9.7i
openssl openssl 0.9.7j
openssl openssl 0.9.8
openssl openssl 0.9.8b
sun solaris
oracle weblogic server *
hp hp-ux 11.11
sun jre 1.3.1
cisco ids -
openpkg openpkg current
sun one web server 6.0
gentoo linux *
suse linux enterprise server 8
netbsd netbsd current
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
hp hp-ux 11.23
cisco application and content networking software *
cisco ciscoworks common management foundation -
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux school server -
sun solaris 8
sun solaris 9
cisco access registrar *
netbsd netbsd 2.0
redhat enterprise linux 3
sun jsse 1.0.3
sun jsse 1.0.3_01
sun jsse 1.0.3_02
suse suse linux 9.2
redhat enterprise linux 2.1
sun jre 1.4.2
sun jre 1.5.0
sun sdk 1.4.2
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
apple mac os x 10.3.9
apple mac os x server 10.3.9
debian debian linux 3.1
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
sun solaris 10
sun solaris 10
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
sun jre 1.5.0 update3
cisco gss 4480 global site selector *
cisco gss 4490 global site selector *
cisco gss 4491 global site selector *
cisco secure access control server *
netbsd netbsd 2.1
netbsd netbsd 2.0.3
openpkg openpkg 2.5
netbsd netbsd 3.0
redhat rhel extras 3
redhat rhel extras 4
netbsd netbsd 2.0.1
netbsd netbsd 2.0.2
canonical ubuntu 6.06
sun java system web server 6.1
cisco callmanager express -
suse suse linux 10.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
mandrakesoft mandrake linux 2006
mozilla firefox 1.5.0.7
mozilla thunderbird 1.5.0.7
mozilla seamonkey 1.0.5
mozilla network security services 3.11.3
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
sun java system web proxy server 3.6
sun java system application server 8.1
cisco mds 9500 -
cisco ons 15454 *
cisco unified presence server *
cisco application control engine module 1.1
cisco wide area application services -
cisco ciscoworks common services -
apple mac os x server 10.4.8
apple mac os x 10.4.8
netbsd netbsd 4.0 beta
netbsd netbsd 3.0.1
cisco security agent 5.1
turbolinux turbolinux fuji
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
cisco unified callmanager 4.1
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun sdk 1.4.2_11
sun sdk 1.4.2_12
vmware workstation 6.0
hp system management homepage 2.1
hp system management homepage 2.1.1
hp system management homepage 2.1.2
hp system management homepage 2.1.3
hp system management homepage 2.1.4
hp system management homepage 2.1.5
hp system management homepage 2.1.6
novell open enterprise server *
sun jdk 1.5.0
sun jdk 1.5.0 update1
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update7_b03
sun jdk 1.5.0 update8
sun jre 1.3.1 update1
sun jre 1.3.1 update15
sun jre 1.3.1 update16
sun jre 1.3.1 update18
sun jre 1.3.1 update19
sun jre 1.3.1 update1a
sun jre 1.3.1 update4
sun jre 1.3.1 update8
sun jre 1.4.2 update1
sun jre 1.4.2 update2
sun jre 1.4.2 update3
sun jre 1.4.2 update4
sun jre 1.4.2 update5
sun jre 1.5.0 update1
sun jre 1.5.0 update2
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun jsse 1.0.3_03
sun sdk 1.3.1_01
sun sdk 1.3.1_01a
sun sdk 1.3.1_16
sun sdk 1.3.1_18
sun sdk 1.3.1_19
sun sdk 1.4.2_03
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
vmware server 1.0.3
netbsd netbsd 2.0.4
netbsd netbsd 3.0.2
suse suse linux 9.3
vmware server 1.0
vmware workstation 6.0.1
vmware workstation 6.0.2
vmware server 1.0.1
vmware server 1.0.2
vmware server 1.0.4
sun sdk 1.4.2_04
sun sdk 1.4.2_02
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_01
sun sdk 1.3.1_02
sun sdk 1.3.1_04
sun sdk 1.3.1_05
sun sdk 1.3.1_06
sun sdk 1.3.1_07
sun sdk 1.3.1_08
sun sdk 1.3.1_09
sun sdk 1.3.1_10
sun sdk 1.3.1_11
sun sdk 1.3.1_12
sun sdk 1.3.1_13
sun sdk 1.3.1_14
sun sdk 1.3.1_15
sun sdk 1.3.1_17
sun jre 1.3.1 update2
sun jre 1.3.1 update12
sun jre 1.3.1 update17
sun sdk 1.3.1_03
sun solaris 9