Vulnerability Name:

CVE-2006-5201 (CCN-28755)

Assigned:2006-09-05
Published:2006-09-05
Updated:2019-07-31
Summary:Multiple packages on Sun Solaris, including (1) NSS; (2) Java JDK and JRE 5.0 Update 8 and earlier, SDK and JRE 1.4.x up to 1.4.2_12, and SDK and JRE 1.3.x up to 1.3.1_19; (3) JSSE 1.0.3_03 and earlier; (4) IPSec/IKE; (5) Secure Global Desktop; and (6) StarOffice, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents these products from correctly verifying X.509 and other certificates that use PKCS #1.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Thu Sep 14 2006 - 04:01:28 CDT
SIP over TLS: X.509 peer authentication vulnerability in Ingate products

Source: CCN
Type: Full-Disclosure Mailing List, Tue Sep 5 15:22:20 BST 2006
[SECURITY] OpenSSL 0.9.8c and 0.9.7k released

Source: CCN
Type: Full-Disclosure Mailing List, Mon Jan 08 2007 - 20:17:36 CST
VMware ESX server security updates

Source: MITRE
Type: CNA
CVE-2006-4339

Source: MITRE
Type: CNA
CVE-2006-5201

Source: MITRE
Type: CNA
CVE-2006-5484

Source: MITRE
Type: CNA
CVE-2007-5810

Source: CCN
Type: Apple Security Update 2006-007
About the security content of Security Update 2006-007

Source: CCN
Type: Apple Web site
About the security content of Java Release 6 for Mac OS X 10.4

Source: CCN
Type: NetBSD-SA2006-023
OpenSSL RSA Signature Forgery

Source: CCN
Type: HP Security Bulletin HPSBUX02219 SSRT061273
HP-UX Running BIND, Remote Denial of Service (DoS)

Source: CCN
Type: HP Security Bulletin HPSBMA02250 SSRT061275 rev.1
HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS)

Source: CCN
Type: RHSA-2006-0661
openssl security update

Source: CCN
Type: RHSA-2007-0062
Critical: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2007-0072
Critical: IBMJava2 security update

Source: CCN
Type: RHSA-2007-0073
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2008-0264
Moderate: Red Hat Network Satellite Server Solaris client security update

Source: CCN
Type: RHSA-2008-0525
Moderate: Red Hat Network Satellite Server Solaris client security update

Source: CCN
Type: RHSA-2008-0629
Moderate: Red Hat Network Satellite Server Solaris client security update

Source: CCN
Type: SA21709
OpenSSL RSA Signature Forgery Vulnerability

Source: CCN
Type: SA21846
OpenVPN OpenSSL RSA Signature Forgery

Source: CCN
Type: SA21870
Avaya Products OpenSSL Vulnerability

Source: CCN
Type: SA21906
Mozilla Firefox Multiple Vulnerabilities

Source: CCN
Type: SA21930
Ingate Firewall and SIParator OpenSSL Vulnerability

Source: CCN
Type: SA21982
Opera SSL RSA Signature Forgery Vulnerability

Source: CCN
Type: SA22204
Sun Java JDK / SDK RSA Signature Forgery Vulnerability

Source: SECUNIA
Type: Patch, Third Party Advisory
22204

Source: CCN
Type: SA22226
Sun Solaris RSA Signature Forgery Vulnerability

Source: SECUNIA
Type: Third Party Advisory
22226

Source: CCN
Type: SA22232
OpenVPN Multiple Vulnerabilities

Source: CCN
Type: SA22284
Serv-U FTP Server OpenSSL Multiple Vulnerabilities

Source: CCN
Type: SA22325
Sun Secure Global Desktop Software RSA Signature Forgery Vulnerability

Source: SECUNIA
Type: Third Party Advisory
22325

Source: CCN
Type: SA22350
SSH Tectia Products RSA Signature Forgery Vulnerability

Source: CCN
Type: SA22513
Reflection Products RSA Signature Forgery Vulnerability

Source: CCN
Type: SA22523
IBM HMC Apache2 / OpenSSL Vulnerabilities

Source: CCN
Type: SA22545
Blue Coat Products RSA Signature Vulnerability

Source: CCN
Type: SA22585
Sun JES / Solaris OpenSSL RSA Signature Forgery

Source: CCN
Type: SA22671
BIND OpenSSL Vulnerabilities

Source: CCN
Type: SA22711
Juniper Secure Access / Unified Access Control RSA Signature Forgery

Source: CCN
Type: SA22733
Sun Java System Multiple Products RSA Signature Forgery

Source: CCN
Type: SA22758
Cisco Products OpenSSL Vulnerabilities

Source: CCN
Type: SA22799
Cisco Products OpenSSL Vulnerabilities

Source: CCN
Type: SA22934
Sybase Afaria RSA Signature Forgery

Source: CCN
Type: SA22936
Sybase Mach Desktop RSA Signature Forgery

Source: CCN
Type: SA22937
Sybase mFolio RSA Signature Forgery

Source: CCN
Type: SA22938
Sybase PowerBuilder RSA Signature Forgery

Source: CCN
Type: SA22939
Sybase RFID Enterprise RSA Signature Forgery

Source: CCN
Type: SA22940
Sybase Unwired Accelerator RSA Signature Forgery

Source: CCN
Type: SA22949
Sybase Enterprise Portal RSA Signature Forgery

Source: CCN
Type: SA22992
Avaya CMS Sun Solaris X Display Manager Security Issue

Source: SECUNIA
Type: Third Party Advisory
22992

Source: CCN
Type: SA23155
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: CCN
Type: SA23455
Sun Solaris WAN Boot RSA Signature Forgery Vulnerability

Source: CCN
Type: SA23680
VMWare ESX Server Multiple Vulnerabilities

Source: CCN
Type: SA23794
Oracle Products Multiple Vulnerabilities

Source: CCN
Type: SA23841
SecureCRT / SecureFX OpenSSL RSA Signature Forgery

Source: CCN
Type: SA24930
HP Tru64 UNIX Multiple SSL and BIND Vulnerabilities

Source: CCN
Type: SA24950
HP Insight Management Agents SSL Vulnerabilities

Source: CCN
Type: SA25284
BEA Products Multiple Vulnerabilities

Source: CCN
Type: SA25399
Novell International Cryptographic Infrastructure Two Vulnerabilities

Source: CCN
Type: SA26329
HP System Management Homepage Apache and OpenSSL Vulnerabilities

Source: CCN
Type: SA26893
rPath update for openssl

Source: CCN
Type: SA27421
Hitachi Web Server Multiple Vulnerabilities

Source: CCN
Type: SA28115
Mac OS X Java Multiple Vulnerabilities

Source: CCN
Type: SA29412
VMware Server Multiple Vulnerabilities

Source: CCN
Type: SA38567
OpenOffice.org 2 Multiple Vulnerabilities

Source: CCN
Type: SA38568
OpenOffice.org 3 Multiple Vulnerabilities

Source: CCN
Type: SA41818
Oracle Open Office Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1016791
OpenSSL RSA Signatures Can Be Forged

Source: CCN
Type: SECTRACK ID: 1017060
(SSH Issues Fix for Tectia Server) OpenSSL RSA Signatures Can Be Forged

Source: CCN
Type: SECTRACK ID: 1017061
(SSH Issues Fix for Tectia Manager) OpenSSL RSA Signatures Can Be Forged

Source: CCN
Type: SECTRACK ID: 1017522
Oracle Database and Other Products Have 52 Unspecified Vulnerabilities With Unspecified Impact

Source: CCN
Type: Sun Alert ID: 102648
Security Vulnerability in RSA Signature Verification Impacting Multiple SUN Products

Source: SUNALERT
Type: Broken Link
102648

Source: CCN
Type: Sun Alert ID: 102656
Security Vulnerability Issue of Forged RSA Signatures for Java Enterprise System and Solaris

Source: CCN
Type: Sun Alert ID: 102657
Security Vulnerability With RSA Signature Affects the Sun Secure Global Desktop Software

Source: SUNALERT
Type: Broken Link
102657

Source: CCN
Type: Sun Alert ID: 102686
Security Vulnerability in RSA Signature Verification Affects Java 2 Platform, Standard Edition

Source: CCN
Type: Sun Alert ID: 102696
A Security Vulnerability in RSA Signature Verification Affects Sun Java System Application Server, Proxy Server and Web Server

Source: CCN
Type: Sun Alert ID: 102722
Security Vulnerability With RSA Signature Affects Solaris Applications Utilizing the libike Library

Source: CCN
Type: Sun Alert ID: 102744
Security Vulnerability With RSA Signatures Affects OpenSSL Shipped With Solaris

Source: CCN
Type: Sun Alert ID: 102759
Security Vulnerability With RSA Signatures Affects Solaris WAN Boot

Source: CCN
Type: ASA-2006-188
openssl security update (RHSA-2006-0661)

Source: CCN
Type: ASA-2006-241
HP-UX VirtualVault Vulnerabilities

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm

Source: CCN
Type: ASA-2006-250
Sun Alert Notifications from Sun Weekly Report dated October 07 2006

Source: CCN
Type: ASA-2006-251
Sun Alert Notifications from Sun Weekly Report dated Oct 28 2006

Source: CCN
Type: ASA-2006-264
Security Vulnerability With RSA Signature Affects Solaris Applications Utilizing the libike Library

Source: CCN
Type: ASA-2006-266
Security Vulnerability With RSA Signatures Affects OpenSSL Shipped With Solaris 10

Source: CCN
Type: ASA-2007-090
IBMJava2 security update (RHSA-2007-0072)

Source: CCN
Type: ASA-2007-091
java-1.4.2-ibm security update (RHSA-2007-0062)

Source: CCN
Type: ASA-2007-093
java-1.5.0-ibm security update (RHSA-2007-0073)

Source: CCN
Type: ASA-2007-097
HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153)

Source: CCN
Type: ASA-2007-240
HP-UX Running BIND Remote Denial of Service (DoS) (HPSBUX02219)

Source: CCN
Type: cisco-sr-20061108-openssl
Cisco Security Response: Multiple Vulnerabilities in OpenSSL Library

Source: DEBIAN
Type: DSA-1173
openssl -- cryptographic weakness

Source: DEBIAN
Type: DSA-1174
openssl096 -- cryptographic weakness

Source: CCN
Type: GLSA-200609-05
OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery

Source: CCN
Type: GLSA-200609-18
Opera: RSA signature forgery

Source: CCN
Type: GLSA-200610-06
Mozilla Network Security Service (NSS): RSA signature forgery

Source: CCN
Type: Hitachi Security Vulnerability Information HS07-034
Vulnerability in Hitachi Web Server Function for Authenticating SSL Clients

Source: CCN
Type: US-CERT VU#845620
Multiple RSA implementations fail to properly handle signatures

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#845620

Source: CCN
Type: MFSA 2006-60
RSA Signature Forgery

Source: CCN
Type: OpenOffice Web Site
Security Vulnerability in OpenOffice.org resulting from 3rd party libraries

Source: CCN
Type: OpenPKG-SA-2006.018
OpenSSL

Source: CCN
Type: OpenPKG-SA-2006.029
BIND

Source: CCN
Type: OpenSSL Web site
OpenSSL:The Open Source toolkit for SSL/TLS

Source: CCN
Type: OpenSSL Security Advisory [5th September 2006]
RSA Signature Forgery (CVE-2006-4339)

Source: CCN
Type: OSVDB ID: 28549
OpenSSL RSA Key PKCS #1 v1.5 Signature Forgery

Source: CCN
Type: OSVDB ID: 30166
Sun ONE/Java System Web Server NSS Unspecified Remote DoS

Source: CCN
Type: OSVDB ID: 42026
Hitachi Web Server SSL Client Certification Validation Weakness

Source: CCN
Type: BID-19849
OpenSSL PKCS Padding RSA Signature Forgery Vulnerability

Source: CCN
Type: BID-22083
Oracle January 2007 Security Update Multiple Vulnerabilities

Source: CCN
Type: BID-26271
Hitachi Web Server HTML Injection Vulnerability and Signature Forgery Vulnerability

Source: CCN
Type: BID-28276
VMware Server 1.0.5 and Workstation 6.0.3 Multiple Vulnerabilities

Source: CCN
Type: TLSA-2006-29
Multiple RSA implementations fail

Source: CCN
Type: USN-339-1
OpenSSL vulnerability

Source: CCN
Type: VMware Server Web site
Key Features in VMware Server, What's New in Version 1.0.5

Source: CCN
Type: Vmware Workstation Web site
VMware Workstation 6.0 Release Notes, New in Version 6.0.3

Source: VUPEN
Type: Permissions Required
ADV-2006-3898

Source: VUPEN
Type: Permissions Required
ADV-2006-3899

Source: VUPEN
Type: Permissions Required
ADV-2006-3960

Source: XF
Type: UNKNOWN
openssl-rsa-security-bypass(28755)

Source: CCN
Type: Novell Security Alert 3590033
Security Vulnerability: Multiple RSA implementations fail to properly handle signatures

Source: CCN
Type: BEA07-169.00
WebLogic SSL may verify RSA Signatures incorrectly if the RSA key exponent is 3

Source: SUSE
Type: SUSE-SA:2006:055
PKCS RSA signature forgery

Source: SUSE
Type: SUSE-SA:2006:061
opera security problems

Source: SUSE
Type: SUSE-SA:2007:010
IBMJava security update

Source: SUSE
Type: SUSE-SR:2006:024
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2006:026
SUSE Security Summary Report

Source: CCN
Type: IBM Systems Support Web site
Support for HMC

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:nss:*:*:*:*:*:*:*:*
  • OR cpe:/a:sun:secure_global_desktop:*:*:*:*:*:*:*:*
  • OR cpe:/a:sun:staroffice:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:*
  • OR cpe:/o:sun:solaris:10.0:*:*:*:*:sparc:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:sun:sdk:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_03:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:::x86:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:*
  • OR cpe:/h:cisco:ids:-:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_common_management_foundation:-:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*
  • OR cpe:/a:cisco:access_registrar:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_02:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1::as:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:gss_4491_global_site_selector:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:secure_access_control_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:callmanager_express:-:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:mds_9500:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ons_15454:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_presence_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:application_control_engine_module:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:wide_area_application_services:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_common_services:-:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:4.0:beta:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:security_agent:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/a:cisco:unified_callmanager:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sun nss *
    sun secure global desktop *
    sun staroffice *
    sun solaris 9.0
    sun solaris 10.0
    sun sunos 5.8
    sun jdk 1.5.0 -
    sun jdk 1.5.0 update1
    sun jdk 1.5.0 update2
    sun jdk 1.5.0 update3
    sun jdk 1.5.0 update4
    sun jdk 1.5.0 update5
    sun jdk 1.5.0 update6
    sun jdk 1.5.0 update7
    sun jdk 1.5.0 update7_b03
    sun jdk 1.5.0 update8
    sun jre 1.3.1 -
    sun jre 1.3.1_2
    sun jre 1.3.1_03
    sun jre 1.3.1_04
    sun jre 1.3.1_05
    sun jre 1.3.1_06
    sun jre 1.3.1_07
    sun jre 1.3.1_08
    sun jre 1.3.1_09
    sun jre 1.3.1_10
    sun jre 1.3.1_11
    sun jre 1.3.1_12
    sun jre 1.3.1_13
    sun jre 1.3.1_14
    sun jre 1.3.1_15
    sun jre 1.3.1_16
    sun jre 1.3.1_17
    sun jre 1.3.1_18
    sun jre 1.3.1_19
    sun jre 1.4.2 -
    sun jre 1.4.2_1
    sun jre 1.4.2_2
    sun jre 1.4.2_3
    sun jre 1.4.2_4
    sun jre 1.4.2_5
    sun jre 1.4.2_6
    sun jre 1.4.2_7
    sun jre 1.4.2_8
    sun jre 1.4.2_9
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_12
    sun jre 1.5.0 -
    sun jre 1.5.0 update1
    sun jre 1.5.0 update2
    sun jre 1.5.0 update3
    sun jre 1.5.0 update4
    sun jre 1.5.0 update5
    sun jre 1.5.0 update6
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun sdk 1.3.1
    sun sdk 1.3.1_01
    sun sdk 1.3.1_01a
    sun sdk 1.3.1_02
    sun sdk 1.3.1_03
    sun sdk 1.3.1_04
    sun sdk 1.3.1_05
    sun sdk 1.3.1_06
    sun sdk 1.3.1_07
    sun sdk 1.3.1_08
    sun sdk 1.3.1_09
    sun sdk 1.3.1_10
    sun sdk 1.3.1_11
    sun sdk 1.3.1_12
    sun sdk 1.3.1_13
    sun sdk 1.3.1_14
    sun sdk 1.3.1_15
    sun sdk 1.3.1_16
    sun sdk 1.3.1_17
    sun sdk 1.3.1_18
    sun sdk 1.3.1_19
    sun sdk 1.4.2
    sun sdk 1.4.2_1
    sun sdk 1.4.2_2
    sun sdk 1.4.2_3
    sun sdk 1.4.2_4
    sun sdk 1.4.2_5
    sun sdk 1.4.2_6
    sun sdk 1.4.2_7
    sun sdk 1.4.2_8
    sun sdk 1.4.2_9
    sun sdk 1.4.2_10
    sun sdk 1.4.2_11
    sun sdk 1.4.2_12
    sun jsse 1.0.3
    sun jsse 1.0.3_01
    sun jsse 1.0.3_02
    sun jsse 1.0.3_03
    openssl openssl 0.9.7a
    openssl openssl 0.9.7
    openssl openssl 0.9.7b
    openssl openssl 0.9.7c
    openssl openssl 0.9.8a
    openssl openssl 0.9.7 beta1
    openssl openssl 0.9.7 beta2
    openssl openssl 0.9.7 beta3
    openssl openssl 0.9.7 beta4
    openssl openssl 0.9.7 beta5
    openssl openssl 0.9.7 beta6
    openssl openssl 0.9.7d
    openssl openssl 0.9.7e
    openssl openssl 0.9.7f
    openssl openssl 0.9.7g
    openssl openssl 0.9.7h
    openssl openssl 0.9.7i
    openssl openssl 0.9.7j
    openssl openssl 0.9.8
    openssl openssl 0.9.8b
    sun solaris
    oracle weblogic server *
    hp hp-ux 11.11
    sun jre 1.3.1
    cisco ids -
    openpkg openpkg current
    sun one web server 6.0
    gentoo linux *
    suse linux enterprise server 8
    netbsd netbsd current
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    hp hp-ux 11.23
    cisco application and content networking software *
    cisco ciscoworks common management foundation -
    suse suse linux 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    suse suse linux school server -
    sun solaris 8
    sun solaris 9
    cisco access registrar *
    netbsd netbsd 2.0
    redhat enterprise linux 3
    sun jsse 1.0.3
    sun jsse 1.0.3_01
    sun jsse 1.0.3_02
    suse suse linux 9.2
    redhat enterprise linux 2.1
    sun jre 1.4.2
    sun jre 1.5.0
    sun sdk 1.4.2
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    apple mac os x 10.3.9
    apple mac os x server 10.3.9
    debian debian linux 3.1
    novell open enterprise server *
    mandrakesoft mandrake multi network firewall 2.0
    sun solaris 10
    sun solaris 10
    suse suse linux 10.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    sun jre 1.5.0 update3
    cisco gss 4480 global site selector *
    cisco gss 4490 global site selector *
    cisco gss 4491 global site selector *
    cisco secure access control server *
    netbsd netbsd 2.1
    netbsd netbsd 2.0.3
    openpkg openpkg 2.5
    netbsd netbsd 3.0
    redhat rhel extras 3
    redhat rhel extras 4
    netbsd netbsd 2.0.1
    netbsd netbsd 2.0.2
    canonical ubuntu 6.06
    sun java system web server 6.1
    cisco callmanager express -
    suse suse linux 10.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    mandrakesoft mandrake linux 2006
    mozilla firefox 1.5.0.7
    mozilla thunderbird 1.5.0.7
    mozilla seamonkey 1.0.5
    mozilla network security services 3.11.3
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    sun java system web proxy server 3.6
    sun java system application server 8.1
    cisco mds 9500 -
    cisco ons 15454 *
    cisco unified presence server *
    cisco application control engine module 1.1
    cisco wide area application services -
    cisco ciscoworks common services -
    apple mac os x server 10.4.8
    apple mac os x 10.4.8
    netbsd netbsd 4.0 beta
    netbsd netbsd 3.0.1
    cisco security agent 5.1
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    cisco unified callmanager 4.1
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun sdk 1.4.2_11
    sun sdk 1.4.2_12
    vmware workstation 6.0
    hp system management homepage 2.1
    hp system management homepage 2.1.1
    hp system management homepage 2.1.2
    hp system management homepage 2.1.3
    hp system management homepage 2.1.4
    hp system management homepage 2.1.5
    hp system management homepage 2.1.6
    novell open enterprise server *
    sun jdk 1.5.0
    sun jdk 1.5.0 update1
    sun jdk 1.5.0 update2
    sun jdk 1.5.0 update3
    sun jdk 1.5.0 update4
    sun jdk 1.5.0 update5
    sun jdk 1.5.0 update6
    sun jdk 1.5.0 update7
    sun jdk 1.5.0 update7_b03
    sun jdk 1.5.0 update8
    sun jre 1.3.1 update1
    sun jre 1.3.1 update15
    sun jre 1.3.1 update16
    sun jre 1.3.1 update18
    sun jre 1.3.1 update19
    sun jre 1.3.1 update1a
    sun jre 1.3.1 update4
    sun jre 1.3.1 update8
    sun jre 1.4.2 update1
    sun jre 1.4.2 update2
    sun jre 1.4.2 update3
    sun jre 1.4.2 update4
    sun jre 1.4.2 update5
    sun jre 1.5.0 update1
    sun jre 1.5.0 update2
    sun jre 1.5.0 update4
    sun jre 1.5.0 update5
    sun jre 1.5.0 update6
    sun jsse 1.0.3_03
    sun sdk 1.3.1_01
    sun sdk 1.3.1_01a
    sun sdk 1.3.1_16
    sun sdk 1.3.1_18
    sun sdk 1.3.1_19
    sun sdk 1.4.2_03
    sun sdk 1.4.2_08
    sun sdk 1.4.2_09
    sun sdk 1.4.2_10
    vmware server 1.0.3
    netbsd netbsd 2.0.4
    netbsd netbsd 3.0.2
    suse suse linux 9.3
    vmware server 1.0
    vmware workstation 6.0.1
    vmware workstation 6.0.2
    vmware server 1.0.1
    vmware server 1.0.2
    vmware server 1.0.4
    sun sdk 1.4.2_04
    sun sdk 1.4.2_02
    sun sdk 1.4.2_05
    sun sdk 1.4.2_06
    sun sdk 1.4.2_07
    sun sdk 1.4.2_01
    sun sdk 1.3.1_02
    sun sdk 1.3.1_04
    sun sdk 1.3.1_05
    sun sdk 1.3.1_06
    sun sdk 1.3.1_07
    sun sdk 1.3.1_08
    sun sdk 1.3.1_09
    sun sdk 1.3.1_10
    sun sdk 1.3.1_11
    sun sdk 1.3.1_12
    sun sdk 1.3.1_13
    sun sdk 1.3.1_14
    sun sdk 1.3.1_15
    sun sdk 1.3.1_17
    sun jre 1.3.1 update2
    sun jre 1.3.1 update12
    sun jre 1.3.1 update17
    sun sdk 1.3.1_03
    sun solaris 9