CVE-2014-6271 Vulnerability Analysis & Exploit Details

CVE-2014-6271
Vulnerability Scoring

9.8
/10
Critical Risk

As a catastrophic security flaw, CVE-2014-6271 has severe implications, demanding immediate intervention.

Attack Complexity Details

  • Attack Complexity: Low
    Exploits can be performed without significant complexity or special conditions.
  • Attack Vector: Network
    Vulnerability is exploitable over a network without physical access.
  • Privileges Required: None
    No privileges are required for exploitation.
  • Scope: Unchanged
    Exploit remains within the originally vulnerable component.
  • User Interaction: None
    No user interaction is necessary for exploitation.

CVE-2014-6271 Details

Status: Modified

Last updated: 🕑 07 Feb 2025, 14:15 UTC
Originally published on: 🕡 24 Sep 2014, 18:48 UTC

Time between publication and last update: 3788 days

CVSS Release: version 3

CVSS3 Source

nvd@nist.gov

CVSS3 Type

Primary

CVSS3 Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2014-6271 Vulnerability Summary

CVE-2014-6271: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Assessing the Risk of CVE-2014-6271

Access Complexity Graph

The exploitability of CVE-2014-6271 depends on two key factors: attack complexity (the level of effort required to execute an exploit) and privileges required (the access level an attacker needs).

Exploitability Analysis for CVE-2014-6271

With low attack complexity and no required privileges, CVE-2014-6271 is an easy target for cybercriminals. Organizations should prioritize immediate mitigation measures to prevent unauthorized access and data breaches.

Understanding AC and PR

A lower complexity and fewer privilege requirements make exploitation easier. Security teams should evaluate these aspects to determine the urgency of mitigation strategies, such as patch management and access control policies.

Attack Complexity (AC) measures the difficulty in executing an exploit. A high AC means that specific conditions must be met, making an attack more challenging, while a low AC means the vulnerability can be exploited with minimal effort.

Privileges Required (PR) determine the level of system access necessary for an attack. Vulnerabilities requiring no privileges are more accessible to attackers, whereas high privilege requirements limit exploitation to authorized users with elevated access.

CVSS Score Breakdown Chart

Above is the CVSS Sub-score Breakdown for CVE-2014-6271, illustrating how Base, Impact, and Exploitability factors combine to form the overall severity rating. A higher sub-score typically indicates a more severe or easier-to-exploit vulnerability.

CIA Impact Analysis

Below is the Impact Analysis for CVE-2014-6271, showing how Confidentiality, Integrity, and Availability might be affected if the vulnerability is exploited. Higher values usually signal greater potential damage.

  • Confidentiality: High
    Exploiting CVE-2014-6271 can result in unauthorized access to sensitive data, severely compromising data privacy.
  • Integrity: High
    CVE-2014-6271 could allow unauthorized modifications to data, potentially affecting system reliability and trust.
  • Availability: High
    CVE-2014-6271 can disrupt system operations, potentially causing complete denial of service (DoS).

Exploit Prediction Scoring System (EPSS)

The EPSS score estimates the probability that this vulnerability will be exploited in the near future.

EPSS Score: 97.214% (probability of exploit)

EPSS Percentile: 99.92% (lower percentile = lower relative risk)
This vulnerability is less risky than approximately 0.0799999999999983% of others.

CVE-2014-6271 References

External References

CWE Common Weakness Enumeration

CWE-78

CAPEC Common Attack Pattern Enumeration and Classification

  • Command Line Execution through SQL Injection CAPEC-108 An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
  • Command Delimiters CAPEC-15 An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or denylist input validation, as opposed to allowlist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or denylist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on.
  • Exploiting Multiple Input Interpretation Layers CAPEC-43 An attacker supplies the target software with input data that contains sequences of special characters designed to bypass input validation logic. This exploit relies on the target making multiples passes over the input data and processing a "layer" of special characters with each pass. In this manner, the attacker can disguise input that would otherwise be rejected as invalid by concealing it with layers of special/escape characters that are stripped off by subsequent processing steps. The goal is to first discover cases where the input validation layer executes before one or more parsing layers. That is, user input may go through the following logic in an application: <parser1> --> <input validator> --> <parser2>. In such cases, the attacker will need to provide input that will pass through the input validator, but after passing through parser2, will be converted into something that the input validator was supposed to stop.
  • Argument Injection CAPEC-6 An attacker changes the behavior or state of a targeted application through injecting data or command syntax through the targets use of non-validated and non-filtered arguments of exposed services or methods.
  • OS Command Injection CAPEC-88 In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.

Vulnerable Configurations

  • cpe:2.3:a:gnu:bash:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:3.2.57:beta1:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:3.2.57:beta1:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.2.53:beta1:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.2.53:beta1:*:*:*:*:*:*
  • cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.9.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.10.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.11.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.11.0:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.12.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.12.0:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.13.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.13.0:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:eos:4.14.0:*:*:*:*:*:*:*
    cpe:2.3:o:arista:eos:4.14.0:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
    cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
    cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
  • cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
    cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:-:*:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
  • cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*
    cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*
  • cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
    cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
    cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
    cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
    cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
    cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
    cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
    cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:1.1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:1.1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*
  • cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*
    cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*
  • cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:workload_deployer:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:workload_deployer:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:workload_deployer:3.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:workload_deployer:3.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:workload_deployer:3.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:workload_deployer:3.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:workload_deployer:3.1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:workload_deployer:3.1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:workload_deployer:3.1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:workload_deployer:3.1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v7000_firmware:7.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v7000_firmware:7.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v7000_firmware:7.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v7000_firmware:7.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:6.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:6.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:6.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:6.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:6.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:6.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:6.4.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:6.4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:7.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:7.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:7.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:7.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v5000_firmware:7.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v5000_firmware:7.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:6.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:6.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:6.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:6.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:6.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:6.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:6.4.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:6.4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:7.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:7.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:7.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:7.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3700_firmware:7.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3700_firmware:7.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:6.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:6.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:6.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:6.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:6.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:6.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:6.4.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:6.4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:7.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:7.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:7.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:7.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:storwize_v3500_firmware:7.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:storwize_v3500_firmware:7.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:6.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:6.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:6.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:6.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:6.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:6.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:6.4.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:6.4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:7.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:7.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:7.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:7.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:san_volume_controller_firmware:7.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:san_volume_controller_firmware:7.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6500_firmware:3.8.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6500_firmware:3.8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6500_firmware:3.9.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6500_firmware:3.9.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6500_firmware:4.1.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6500_firmware:4.1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6800_firmware:3.8.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6800_firmware:3.8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6800_firmware:3.9.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6800_firmware:3.9.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:ibm:stn6800_firmware:4.1.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:ibm:stn6800_firmware:4.1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*
    cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
  • cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
    cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
    cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
    cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
    cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
    cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
  • cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
    cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r76:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r76:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r77:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r77:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r80:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r80:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r81:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r81:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r71.00:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r71.00:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r71.45:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r71.45:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75.20:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75.20:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75.40:vs:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75.40:vs:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75.45:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75.45:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75.46:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75.46:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r75.47:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r75.47:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:security_gateway:r77.10:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:security_gateway:r77.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_device:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_device:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_device:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_device:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.3.0:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:f5:arx_firmware:6.4.0:*:*:*:*:*:*:*
    cpe:2.3:o:f5:arx_firmware:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*
    cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*
  • cpe:2.3:o:citrix:netscaler_sdx_firmware:10:*:*:*:*:*:*:*
    cpe:2.3:o:citrix:netscaler_sdx_firmware:10:*:*:*:*:*:*:*
  • cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*
    cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.9.5:security_update_2016-001:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.9.5:security_update_2016-001:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*

Protect Your Infrastructure against CVE-2014-6271: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Other 5 Recently Published CVEs Vulnerabilities

  • CVE-2025-26205 – Lua 5.4.7, when the debug library is used, has a out-of-bounds read and segmentation violation in mainpositionTV in ltable.c. NOTE: this is dispute...
  • CVE-2025-26204 – Lua 5.4.7, when the debug library is used, has a out-of-bounds read and segmentation violation in equalkey in ltable.c. NOTE: this is disputed beca...
  • CVE-2025-2129 – A vulnerability was found in Mage AI 0.9.75. It has been classified as problematic. This affects an unknown part. The manipulation leads to insecur...
  • CVE-2025-2127 – A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla. It has been classified as problematic. Affected is an unknown function of th...
  • CVE-2025-2126 – A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla and classified as critical. This issue affects some unknown processing of the...