CVE-2016-0777

Published on: 01/14/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:13 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Certain versions of Mac Os X from Apple contain the following vulnerability:

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

  • CVE-2016-0777 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
UTM Up2Date 9.354 released | Sophos Blog Third Party Advisory
blogs.sophos.com
text/html
URL Logo CONFIRM blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002 Mailing List
Third Party Advisory
lists.apple.com
text/html
URL Logo APPLE APPLE-SA-2016-03-21-5
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
Third Party Advisory
security.FreeBSD.org
text/plain
FREEBSD FreeBSD-SA-16:07
oss-security - Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778 Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
2016-04 Security Bulletin: Junos: OpenSSH Client Information Leak and Buffer Overflow in roaming support (CVE-2016-0777, CVE-2016-0778) - Juniper Networks Third Party Advisory
kb.juniper.net
text/html
URL Logo CONFIRM kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
[security-announce] SUSE-SU-2016:0118-1: critical: Security update for o Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0118
Broadcom Support Portal Third Party Advisory
bto.bluecoat.com
text/html
URL Logo CONFIRM bto.bluecoat.com/security-advisory/sa109
UTM Up2Date 9.319 released | Sophos Blog Third Party Advisory
blogs.sophos.com
text/html
URL Logo CONFIRM blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
[security-announce] SUSE-SU-2016:0120-1: critical: Security update for o Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0120
[security-announce] openSUSE-SU-2016:0128-1: critical: Security update f Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0128
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
[security-announce] openSUSE-SU-2016:0127-1: critical: Security update f Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0127
Oracle Solaris Third Party Bulletin - October 2015 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
USN-2869-1: OpenSSH vulnerabilities | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2869-1
OpenSSH CVE-2016-0777 Information Disclosure Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 80695
Vendor Advisory
www.openssh.com
text/x-diff
CONFIRM www.openssh.com/txt/release-7.1p2
OpenSSH Flaws Let Remote Authenticated Users Obtain Potentially Sensitive Information From Client Memory - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1034671
SecurityFocus Third Party Advisory
VDB Entry
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo BUGTRAQ 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
Full Disclosure: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778 Mailing List
Third Party Advisory
seclists.org
text/html
URL Logo FULLDISC 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
[SECURITY] Fedora 22 Update: gsi-openssh-6.9p1-7.fc22 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-2e89eba0c1
[SECURITY] Fedora 22 Update: openssh-6.9p1-10.fc22 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-c330264861
Oracle Linux Bulletin - January 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
Debian -- Security Information -- DSA-3446-1 openssh Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3446
Qualys Security Advisory - OpenSSH Overflow / Leak ≈ Packet Storm Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
[security-announce] SUSE-SU-2016:0119-1: critical: Security update for o Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0119
[SECURITY] Fedora 23 Update: gsi-openssh-7.1p2-1.fc23 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-4556904561
[security-announce] SUSE-SU-2016:0117-1: critical: Security update for o Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0117
About the security content of OS X El Capitan v10.11.4 and Security Update 2016-002 - Apple Support Third Party Advisory
support.apple.com
text/html
URL Logo CONFIRM support.apple.com/HT206167
[SECURITY] Fedora 23 Update: openssh-7.1p2-1.fc23 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-67c6ef0d4f
OpenSSH: Multiple vulnerabilities (GLSA 201601-01) — Gentoo Security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201601-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
AppleMac Os XAllAllAllAll
ApplicationHpRemote Device Access Virtual Customer Access SystemAllAllAllAll
ApplicationOpenbsdOpenssh5.0AllAllAll
ApplicationOpenbsdOpenssh5.0p1AllAll
ApplicationOpenbsdOpenssh5.1AllAllAll
ApplicationOpenbsdOpenssh5.1p1AllAll
ApplicationOpenbsdOpenssh5.2AllAllAll
ApplicationOpenbsdOpenssh5.2p1AllAll
ApplicationOpenbsdOpenssh5.3AllAllAll
ApplicationOpenbsdOpenssh5.3p1AllAll
ApplicationOpenbsdOpenssh5.4AllAllAll
ApplicationOpenbsdOpenssh5.4p1AllAll
ApplicationOpenbsdOpenssh5.5AllAllAll
ApplicationOpenbsdOpenssh5.5p1AllAll
ApplicationOpenbsdOpenssh5.6AllAllAll
ApplicationOpenbsdOpenssh5.6p1AllAll
ApplicationOpenbsdOpenssh5.7AllAllAll
ApplicationOpenbsdOpenssh5.7p1AllAll
ApplicationOpenbsdOpenssh5.8AllAllAll
ApplicationOpenbsdOpenssh5.8p1AllAll
ApplicationOpenbsdOpenssh5.9AllAllAll
ApplicationOpenbsdOpenssh5.9p1AllAll
ApplicationOpenbsdOpenssh6.0AllAllAll
ApplicationOpenbsdOpenssh6.0p1AllAll
ApplicationOpenbsdOpenssh6.1AllAllAll
ApplicationOpenbsdOpenssh6.1p1AllAll
ApplicationOpenbsdOpenssh6.2AllAllAll
ApplicationOpenbsdOpenssh6.2p1AllAll
ApplicationOpenbsdOpenssh6.2p2AllAll
ApplicationOpenbsdOpenssh6.3AllAllAll
ApplicationOpenbsdOpenssh6.3p1AllAll
ApplicationOpenbsdOpenssh6.4AllAllAll
ApplicationOpenbsdOpenssh6.4p1AllAll
ApplicationOpenbsdOpenssh6.5AllAllAll
ApplicationOpenbsdOpenssh6.5p1AllAll
ApplicationOpenbsdOpenssh6.6AllAllAll
ApplicationOpenbsdOpenssh6.6p1AllAll
ApplicationOpenbsdOpenssh6.7AllAllAll
ApplicationOpenbsdOpenssh6.7p1AllAll
ApplicationOpenbsdOpenssh6.8AllAllAll
ApplicationOpenbsdOpenssh6.8p1AllAll
ApplicationOpenbsdOpenssh6.9AllAllAll
ApplicationOpenbsdOpenssh6.9p1AllAll
ApplicationOpenbsdOpenssh7.0AllAllAll
ApplicationOpenbsdOpenssh7.0p1AllAll
ApplicationOpenbsdOpenssh7.1AllAllAll
ApplicationOpenbsdOpenssh7.1p1AllAll
ApplicationOpenbsdOpenssh5.0AllAllAll
ApplicationOpenbsdOpenssh5.0p1AllAll
ApplicationOpenbsdOpenssh5.1AllAllAll
ApplicationOpenbsdOpenssh5.1p1AllAll
ApplicationOpenbsdOpenssh5.2AllAllAll
ApplicationOpenbsdOpenssh5.2p1AllAll
ApplicationOpenbsdOpenssh5.3AllAllAll
ApplicationOpenbsdOpenssh5.3p1AllAll
ApplicationOpenbsdOpenssh5.4AllAllAll
ApplicationOpenbsdOpenssh5.4p1AllAll
ApplicationOpenbsdOpenssh5.5AllAllAll
ApplicationOpenbsdOpenssh5.5p1AllAll
ApplicationOpenbsdOpenssh5.6AllAllAll
ApplicationOpenbsdOpenssh5.6p1AllAll
ApplicationOpenbsdOpenssh5.7AllAllAll
ApplicationOpenbsdOpenssh5.7p1AllAll
ApplicationOpenbsdOpenssh5.8AllAllAll
ApplicationOpenbsdOpenssh5.8p1AllAll
ApplicationOpenbsdOpenssh5.9AllAllAll
ApplicationOpenbsdOpenssh5.9p1AllAll
ApplicationOpenbsdOpenssh6.0AllAllAll
ApplicationOpenbsdOpenssh6.0p1AllAll
ApplicationOpenbsdOpenssh6.1AllAllAll
ApplicationOpenbsdOpenssh6.1p1AllAll
ApplicationOpenbsdOpenssh6.2AllAllAll
ApplicationOpenbsdOpenssh6.2p1AllAll
ApplicationOpenbsdOpenssh6.2p2AllAll
ApplicationOpenbsdOpenssh6.3AllAllAll
ApplicationOpenbsdOpenssh6.3p1AllAll
ApplicationOpenbsdOpenssh6.4AllAllAll
ApplicationOpenbsdOpenssh6.4p1AllAll
ApplicationOpenbsdOpenssh6.5AllAllAll
ApplicationOpenbsdOpenssh6.5p1AllAll
ApplicationOpenbsdOpenssh6.6AllAllAll
ApplicationOpenbsdOpenssh6.6p1AllAll
ApplicationOpenbsdOpenssh6.7AllAllAll
ApplicationOpenbsdOpenssh6.7p1AllAll
ApplicationOpenbsdOpenssh6.8AllAllAll
ApplicationOpenbsdOpenssh6.8p1AllAll
ApplicationOpenbsdOpenssh6.9AllAllAll
ApplicationOpenbsdOpenssh6.9p1AllAll
ApplicationOpenbsdOpenssh7.0AllAllAll
ApplicationOpenbsdOpenssh7.0p1AllAll
ApplicationOpenbsdOpenssh7.1AllAllAll
ApplicationOpenbsdOpenssh7.1p1AllAll
Operating
System
OracleLinux7AllAllAll
Operating
System
OracleLinux7AllAllAll
Operating
System
OracleSolaris11.3AllAllAll
Operating
System
OracleSolaris11.3AllAllAll
HardwareSophosUnified Threat Management110AllAllAll
HardwareSophosUnified Threat Management120AllAllAll
HardwareSophosUnified Threat Management220AllAllAll
HardwareSophosUnified Threat Management320AllAllAll
HardwareSophosUnified Threat Management425AllAllAll
HardwareSophosUnified Threat Management525AllAllAll
HardwareSophosUnified Threat Management625AllAllAll
HardwareSophosUnified Threat Management110AllAllAll
HardwareSophosUnified Threat Management120AllAllAll
HardwareSophosUnified Threat Management220AllAllAll
HardwareSophosUnified Threat Management320AllAllAll
HardwareSophosUnified Threat Management425AllAllAll
HardwareSophosUnified Threat Management525AllAllAll
HardwareSophosUnified Threat Management625AllAllAll
ApplicationSophosUnified Threat Management Software9.318AllAllAll
ApplicationSophosUnified Threat Management Software9.353AllAllAll
ApplicationSophosUnified Threat Management Software9.318AllAllAll
ApplicationSophosUnified Threat Management Software9.353AllAllAll
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:remote_device_access_virtual_customer_access_system:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:110:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:120:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:220:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:320:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:425:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:525:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:625:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:110:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:120:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:220:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:320:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:425:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:525:*:*:*:*:*:*:*:
  • cpe:2.3:h:sophos:unified_threat_management:625:*:*:*:*:*:*:*:
  • cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*:
  • cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*:
  • cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*:
  • cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*: