CVE-2015-3209
Data ?
Vulnerability ID | CVE-2015-3209 |
---|---|
Published on | 15.06.2015 15:59 |
Severity | HIGH |
Vulnerable configurations ?
-
cpe:2.3:a:juniper:junos_space:-:r1.8:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:1.0:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:1.1:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:1.2:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:1.3:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:1.4:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:2.0:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*,
cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*,
… cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.1:-:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.1:r1.8:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.1:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.2:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.3:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.4:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.5:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.6:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.7:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.8:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r1.9:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r2:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r3:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:13.3:r4:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:14.1:-:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:14.1:r1:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:14.1:r2:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:14.1:r3:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:15.1:-:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:15.1:r2:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:15.1:r3:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_space:15.1:r4:*:*:*:*:*:* - cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.4.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.13.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.0:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.1.2\+dfsg:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.2.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.3.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.3.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.3.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.3.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.3.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1.7.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1\:2.1\+dfsg-12\+deb8u6:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1\:2.8\+dfsg-6\+deb9u8:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1\:3.1\+dfsg-8\+deb10u2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1\:3.1\+dfsg-8\~deb10u1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:1\:4.1-1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1\+dfsg:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.2:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.1.3:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.0:rc5:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:*:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:-:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:rc2:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:rc3:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.0:rc4:*:*:*:*:*:*, cpe:2.3:a:qemu:qemu:2.3.1:*:*:*:*:*:*:*
-
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*,
cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
running on/with
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:intel64:*, cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:x86:*, cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:* - cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*, cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*, cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*, cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:vmware:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
FIPS 140 certificates Display network
Notification subscription
You currently have no selected certificates. Either add certificates from their page to the selection or subscribe to receive notifications of new certificates below.
Your subscription request was successfully received. You will need to confirm your subscription by clicking a confirmation link in an email that will be sent to you shortly. Notifications will be sent to you only after confirmation. If you do not confirm your subscription within 7 days, the subscription request will expire. If you already have a subscription, it will be updated with the new certificates, but you will need to reconfirm it.
Compare certificates
You currently have no selected certificates for comparison. Add certificates on the page of the certificate. After you do so you will be able to see them here and compare them.