nist-gov/nvd.nist.gov/vuln/detail/CVE-2009-0778
2025-03-07 17:19:30 +00:00

3175 lines
391 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2009-0778</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: false,
cnaV3Present: false,
nistV2Present: true,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2009-0778</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Description </h3>
<p data-testid="vuln-description">The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an &quot;rt_cache leak.&quot;</p><br/>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss3-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss3-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV3MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss2CalculatorAnchor"
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2009-0778&amp;vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger">7.1 HIGH</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss2-panel-vector"
class="tooltipCvss2NistMetrics">(AV:N/AC:M/Au:N/C:N/I:N/A:C)</span></span> <input type="hidden"
id="nistV2MetricHidden"
value="&lt;span id =&#39;cnaV2Metric&#39; style=&#39;display:none&#39;&gt;&lt;strong style=&#39;font-size:1.2em&#39; &gt;CVSS v2.0 Severity and Metrics:&lt;/strong&gt;&lt;p data-testid=&#39;vuln-cvssv2-score-container&#39;&gt;&lt;strong&gt;Base Score: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score&#39;&gt;7.1 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score-severity&#39;&gt;HIGH&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Vector: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-vector&#39;&gt;(AV:N/AC:M/Au:N/C:N/I:N/A:C)&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Impact Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-impact-subscore&#39;&gt;6.9&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Exploitability Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-exploitability-score&#39;&gt;8.6&lt;/span&gt;&lt;/p&gt;&lt;hr /&gt;&lt;p data-testid=&#39;vuln-cvssv2-metrics-container&#39;&gt;&lt;strong&gt;Access Vector (AV): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-av&#39;&gt;Network&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Access Complexity (AC): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-ac&#39;&gt;Medium&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Authentication (AU): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-au&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Confidentiality (C): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Integrity (I): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-i&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Availability (A): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-a&#39;&gt;Complete&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Additional Information: &lt;/strong&gt;&lt;br/&gt;&lt;span data-testid=&#39;vuln-cvssv2-additional&#39;&gt;Allows disruption of service&lt;br/&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;"/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnCommentsPanel"
data-testid="vuln-comments-container">
<h3>
Vendor Statements (<a href="/vuln/vendor-comments"
target="_blank" rel="noopener noreferrer">disclaimer</a>)
</h3>
<div class="bs-callout bs-callout-info" data-testid="vuln-comments-row-0">
<h4>Official Statement from Red Hat (05/19/2009)</h4>
<p>This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.
It was addressed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2009-0326.html .</div>
</div>
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160"
target="_blank" rel="noopener noreferrer">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160"
target="_blank" rel="noopener noreferrer">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-2">
<td data-testid="vuln-hyperlinks-link-2">
<a
href="http://openwall.com/lists/oss-security/2009/03/11/2"
target="_blank" rel="noopener noreferrer">http://openwall.com/lists/oss-security/2009/03/11/2</a></td>
<td data-testid="vuln-hyperlinks-resType-2">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-3">
<td data-testid="vuln-hyperlinks-link-3">
<a
href="http://openwall.com/lists/oss-security/2009/03/11/2"
target="_blank" rel="noopener noreferrer">http://openwall.com/lists/oss-security/2009/03/11/2</a></td>
<td data-testid="vuln-hyperlinks-resType-3">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-4">
<td data-testid="vuln-hyperlinks-link-4">
<a
href="http://secunia.com/advisories/33758"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/33758</a></td>
<td data-testid="vuln-hyperlinks-resType-4">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-5">
<td data-testid="vuln-hyperlinks-link-5">
<a
href="http://secunia.com/advisories/33758"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/33758</a></td>
<td data-testid="vuln-hyperlinks-resType-5">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-6">
<td data-testid="vuln-hyperlinks-link-6">
<a
href="http://secunia.com/advisories/37471"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/37471</a></td>
<td data-testid="vuln-hyperlinks-resType-6">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-7">
<td data-testid="vuln-hyperlinks-link-7">
<a
href="http://secunia.com/advisories/37471"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/37471</a></td>
<td data-testid="vuln-hyperlinks-resType-7">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-8">
<td data-testid="vuln-hyperlinks-link-8">
<a
href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25"
target="_blank" rel="noopener noreferrer">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25</a></td>
<td data-testid="vuln-hyperlinks-resType-8">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-9">
<td data-testid="vuln-hyperlinks-link-9">
<a
href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25"
target="_blank" rel="noopener noreferrer">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25</a></td>
<td data-testid="vuln-hyperlinks-resType-9">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-10">
<td data-testid="vuln-hyperlinks-link-10">
<a
href="http://www.redhat.com/support/errata/RHSA-2009-0326.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2009-0326.html</a></td>
<td data-testid="vuln-hyperlinks-resType-10">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-11">
<td data-testid="vuln-hyperlinks-link-11">
<a
href="http://www.redhat.com/support/errata/RHSA-2009-0326.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2009-0326.html</a></td>
<td data-testid="vuln-hyperlinks-resType-11">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-12">
<td data-testid="vuln-hyperlinks-link-12">
<a
href="http://www.securityfocus.com/archive/1/507985/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/507985/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-12">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-13">
<td data-testid="vuln-hyperlinks-link-13">
<a
href="http://www.securityfocus.com/archive/1/507985/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/507985/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-13">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-14">
<td data-testid="vuln-hyperlinks-link-14">
<a
href="http://www.securityfocus.com/bid/34084"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/34084</a></td>
<td data-testid="vuln-hyperlinks-resType-14">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-15">
<td data-testid="vuln-hyperlinks-link-15">
<a
href="http://www.securityfocus.com/bid/34084"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/34084</a></td>
<td data-testid="vuln-hyperlinks-resType-15">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-16">
<td data-testid="vuln-hyperlinks-link-16">
<a
href="http://www.securitytracker.com/id?1021958"
target="_blank" rel="noopener noreferrer">http://www.securitytracker.com/id?1021958</a></td>
<td data-testid="vuln-hyperlinks-resType-16">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-17">
<td data-testid="vuln-hyperlinks-link-17">
<a
href="http://www.securitytracker.com/id?1021958"
target="_blank" rel="noopener noreferrer">http://www.securitytracker.com/id?1021958</a></td>
<td data-testid="vuln-hyperlinks-resType-17">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-18">
<td data-testid="vuln-hyperlinks-link-18">
<a
href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
target="_blank" rel="noopener noreferrer">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</a></td>
<td data-testid="vuln-hyperlinks-resType-18">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-19">
<td data-testid="vuln-hyperlinks-link-19">
<a
href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
target="_blank" rel="noopener noreferrer">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</a></td>
<td data-testid="vuln-hyperlinks-resType-19">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-20">
<td data-testid="vuln-hyperlinks-link-20">
<a
href="http://www.vupen.com/english/advisories/2009/3316"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/3316</a></td>
<td data-testid="vuln-hyperlinks-resType-20">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-21">
<td data-testid="vuln-hyperlinks-link-21">
<a
href="http://www.vupen.com/english/advisories/2009/3316"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/3316</a></td>
<td data-testid="vuln-hyperlinks-resType-21">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-22">
<td data-testid="vuln-hyperlinks-link-22">
<a
href="https://bugzilla.redhat.com/show_bug.cgi?id=485163"
target="_blank" rel="noopener noreferrer">https://bugzilla.redhat.com/show_bug.cgi?id=485163</a></td>
<td data-testid="vuln-hyperlinks-resType-22">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Issue Tracking</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-23">
<td data-testid="vuln-hyperlinks-link-23">
<a
href="https://bugzilla.redhat.com/show_bug.cgi?id=485163"
target="_blank" rel="noopener noreferrer">https://bugzilla.redhat.com/show_bug.cgi?id=485163</a></td>
<td data-testid="vuln-hyperlinks-resType-23">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Issue Tracking</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-24">
<td data-testid="vuln-hyperlinks-link-24">
<a
href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49199"
target="_blank" rel="noopener noreferrer">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199</a></td>
<td data-testid="vuln-hyperlinks-resType-24">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-25">
<td data-testid="vuln-hyperlinks-link-25">
<a
href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49199"
target="_blank" rel="noopener noreferrer">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199</a></td>
<td data-testid="vuln-hyperlinks-resType-25">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-26">
<td data-testid="vuln-hyperlinks-link-26">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215</a></td>
<td data-testid="vuln-hyperlinks-resType-26">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-27">
<td data-testid="vuln-hyperlinks-link-27">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215</a></td>
<td data-testid="vuln-hyperlinks-resType-27">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-28">
<td data-testid="vuln-hyperlinks-link-28">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867</a></td>
<td data-testid="vuln-hyperlinks-resType-28">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-29">
<td data-testid="vuln-hyperlinks-link-29">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867</a></td>
<td data-testid="vuln-hyperlinks-resType-29">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<span>NVD-CWE-Other</span>
</td>
<td
data-testid="vuln-CWEs-link-0">Other</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cweNvdIcon"
alt="cwe source acceptance level">
<span>NIST</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2009-0778"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:347,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0&quot;,&quot;id&quot;:&quot;13697865&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1&quot;,&quot;id&quot;:&quot;13697837&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest10%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-2&quot;,&quot;id&quot;:&quot;13697887&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest11%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-3&quot;,&quot;id&quot;:&quot;13697798&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-4&quot;,&quot;id&quot;:&quot;13697762&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-5&quot;,&quot;id&quot;:&quot;13697966&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-6&quot;,&quot;id&quot;:&quot;13697860&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-7&quot;,&quot;id&quot;:&quot;13697757&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-8&quot;,&quot;id&quot;:&quot;13697846&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-9&quot;,&quot;id&quot;:&quot;13697967&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest8%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-10&quot;,&quot;id&quot;:&quot;13697968&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest9%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.0:test9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-11&quot;,&quot;id&quot;:&quot;13697888&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-12&quot;,&quot;id&quot;:&quot;13697711&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.1:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-13&quot;,&quot;id&quot;:&quot;13697889&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.1:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-14&quot;,&quot;id&quot;:&quot;13697813&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.1:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-15&quot;,&quot;id&quot;:&quot;13697796&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-16&quot;,&quot;id&quot;:&quot;13697791&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.2:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-17&quot;,&quot;id&quot;:&quot;13697863&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.2:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-18&quot;,&quot;id&quot;:&quot;13697969&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.2:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-19&quot;,&quot;id&quot;:&quot;13697801&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-20&quot;,&quot;id&quot;:&quot;13697759&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.3:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-21&quot;,&quot;id&quot;:&quot;13697970&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.3:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-22&quot;,&quot;id&quot;:&quot;13697724&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.3:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-23&quot;,&quot;id&quot;:&quot;13697831&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.3:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-24&quot;,&quot;id&quot;:&quot;13697890&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-25&quot;,&quot;id&quot;:&quot;13697771&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.4:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-26&quot;,&quot;id&quot;:&quot;13697703&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.4:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-27&quot;,&quot;id&quot;:&quot;13697804&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.4:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-28&quot;,&quot;id&quot;:&quot;13697683&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-29&quot;,&quot;id&quot;:&quot;13697705&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.5:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-30&quot;,&quot;id&quot;:&quot;13697867&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.5:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-31&quot;,&quot;id&quot;:&quot;13697891&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.5:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-32&quot;,&quot;id&quot;:&quot;13697971&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-33&quot;,&quot;id&quot;:&quot;13697972&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.6:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-34&quot;,&quot;id&quot;:&quot;13697892&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.6:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-35&quot;,&quot;id&quot;:&quot;13697893&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.6:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-36&quot;,&quot;id&quot;:&quot;13697792&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-37&quot;,&quot;id&quot;:&quot;13697894&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.7:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-38&quot;,&quot;id&quot;:&quot;13697779&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.7:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-39&quot;,&quot;id&quot;:&quot;13697843&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.7:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-40&quot;,&quot;id&quot;:&quot;13697720&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-41&quot;,&quot;id&quot;:&quot;13697827&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-42&quot;,&quot;id&quot;:&quot;13697797&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-43&quot;,&quot;id&quot;:&quot;13697973&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-44&quot;,&quot;id&quot;:&quot;13697974&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-45&quot;,&quot;id&quot;:&quot;13697789&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.8.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-46&quot;,&quot;id&quot;:&quot;13697975&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-47&quot;,&quot;id&quot;:&quot;13697976&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.9:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-48&quot;,&quot;id&quot;:&quot;13697764&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.9:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-49&quot;,&quot;id&quot;:&quot;13697895&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.9:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-50&quot;,&quot;id&quot;:&quot;13697780&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.9:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-51&quot;,&quot;id&quot;:&quot;13697896&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-52&quot;,&quot;id&quot;:&quot;13697744&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.10:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-53&quot;,&quot;id&quot;:&quot;13697897&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.10:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-54&quot;,&quot;id&quot;:&quot;13697856&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.10:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-55&quot;,&quot;id&quot;:&quot;13697709&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-56&quot;,&quot;id&quot;:&quot;13697687&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-57&quot;,&quot;id&quot;:&quot;13697884&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-58&quot;,&quot;id&quot;:&quot;13697898&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-59&quot;,&quot;id&quot;:&quot;13697681&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-60&quot;,&quot;id&quot;:&quot;13697816&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-61&quot;,&quot;id&quot;:&quot;13697977&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-62&quot;,&quot;id&quot;:&quot;13697978&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-63&quot;,&quot;id&quot;:&quot;13697704&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-64&quot;,&quot;id&quot;:&quot;13697899&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-65&quot;,&quot;id&quot;:&quot;13697979&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-66&quot;,&quot;id&quot;:&quot;13697778&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-67&quot;,&quot;id&quot;:&quot;13697754&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-68&quot;,&quot;id&quot;:&quot;13697900&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-69&quot;,&quot;id&quot;:&quot;13697730&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-70&quot;,&quot;id&quot;:&quot;13697855&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-71&quot;,&quot;id&quot;:&quot;13697708&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-72&quot;,&quot;id&quot;:&quot;13697756&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.11.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-73&quot;,&quot;id&quot;:&quot;13697980&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-74&quot;,&quot;id&quot;:&quot;13697981&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-75&quot;,&quot;id&quot;:&quot;13697698&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-76&quot;,&quot;id&quot;:&quot;13697812&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-77&quot;,&quot;id&quot;:&quot;13697848&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-78&quot;,&quot;id&quot;:&quot;13697699&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-79&quot;,&quot;id&quot;:&quot;13697795&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-80&quot;,&quot;id&quot;:&quot;13697982&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-81&quot;,&quot;id&quot;:&quot;13697854&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-82&quot;,&quot;id&quot;:&quot;13697881&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-83&quot;,&quot;id&quot;:&quot;13697901&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-84&quot;,&quot;id&quot;:&quot;13697902&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-85&quot;,&quot;id&quot;:&quot;13697839&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.12.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-86&quot;,&quot;id&quot;:&quot;13697903&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-87&quot;,&quot;id&quot;:&quot;13697725&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-88&quot;,&quot;id&quot;:&quot;13697745&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-89&quot;,&quot;id&quot;:&quot;13697773&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-90&quot;,&quot;id&quot;:&quot;13697983&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-91&quot;,&quot;id&quot;:&quot;13697904&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-92&quot;,&quot;id&quot;:&quot;13697710&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-93&quot;,&quot;id&quot;:&quot;13697750&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13:rc7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-94&quot;,&quot;id&quot;:&quot;13697760&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-95&quot;,&quot;id&quot;:&quot;13697984&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-96&quot;,&quot;id&quot;:&quot;13697794&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-97&quot;,&quot;id&quot;:&quot;13697728&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-98&quot;,&quot;id&quot;:&quot;13697870&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.13.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-99&quot;,&quot;id&quot;:&quot;13697807&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-100&quot;,&quot;id&quot;:&quot;13697740&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-101&quot;,&quot;id&quot;:&quot;13697905&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-102&quot;,&quot;id&quot;:&quot;13697702&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-103&quot;,&quot;id&quot;:&quot;13697800&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-104&quot;,&quot;id&quot;:&quot;13697985&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-105&quot;,&quot;id&quot;:&quot;13697986&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-106&quot;,&quot;id&quot;:&quot;13697833&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-107&quot;,&quot;id&quot;:&quot;13697987&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-108&quot;,&quot;id&quot;:&quot;13697749&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-109&quot;,&quot;id&quot;:&quot;13697739&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-110&quot;,&quot;id&quot;:&quot;13697793&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-111&quot;,&quot;id&quot;:&quot;13697853&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.14.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-112&quot;,&quot;id&quot;:&quot;13697721&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-113&quot;,&quot;id&quot;:&quot;13697906&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-114&quot;,&quot;id&quot;:&quot;13697988&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-115&quot;,&quot;id&quot;:&quot;13697850&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-116&quot;,&quot;id&quot;:&quot;13697824&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-117&quot;,&quot;id&quot;:&quot;13697727&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-118&quot;,&quot;id&quot;:&quot;13697783&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-119&quot;,&quot;id&quot;:&quot;13697907&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15:rc7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-120&quot;,&quot;id&quot;:&quot;13697989&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-121&quot;,&quot;id&quot;:&quot;13697777&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-122&quot;,&quot;id&quot;:&quot;13697908&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-123&quot;,&quot;id&quot;:&quot;13697706&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-124&quot;,&quot;id&quot;:&quot;13697909&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-125&quot;,&quot;id&quot;:&quot;13697990&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-126&quot;,&quot;id&quot;:&quot;13697774&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-127&quot;,&quot;id&quot;:&quot;13697840&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-128&quot;,&quot;id&quot;:&quot;13697910&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-129&quot;,&quot;id&quot;:&quot;13697911&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-130&quot;,&quot;id&quot;:&quot;13697821&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.15.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-131&quot;,&quot;id&quot;:&quot;13697832&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-132&quot;,&quot;id&quot;:&quot;13697912&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-133&quot;,&quot;id&quot;:&quot;13697723&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-134&quot;,&quot;id&quot;:&quot;13697991&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-135&quot;,&quot;id&quot;:&quot;13697992&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-136&quot;,&quot;id&quot;:&quot;13697866&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-137&quot;,&quot;id&quot;:&quot;13697838&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-138&quot;,&quot;id&quot;:&quot;13697716&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-139&quot;,&quot;id&quot;:&quot;13697786&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-140&quot;,&quot;id&quot;:&quot;13697913&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-141&quot;,&quot;id&quot;:&quot;13697845&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-142&quot;,&quot;id&quot;:&quot;13697765&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-143&quot;,&quot;id&quot;:&quot;13697993&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-144&quot;,&quot;id&quot;:&quot;13697714&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-145&quot;,&quot;id&quot;:&quot;13697994&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-146&quot;,&quot;id&quot;:&quot;13697715&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-147&quot;,&quot;id&quot;:&quot;13697697&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-148&quot;,&quot;id&quot;:&quot;13697914&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-149&quot;,&quot;id&quot;:&quot;13697817&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-150&quot;,&quot;id&quot;:&quot;13697915&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-151&quot;,&quot;id&quot;:&quot;13697758&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-152&quot;,&quot;id&quot;:&quot;13697820&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.15&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-153&quot;,&quot;id&quot;:&quot;13697772&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.16&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-154&quot;,&quot;id&quot;:&quot;13697690&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.17&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-155&quot;,&quot;id&quot;:&quot;13697916&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.18&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-156&quot;,&quot;id&quot;:&quot;13697742&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.19&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-157&quot;,&quot;id&quot;:&quot;13697995&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.20&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-158&quot;,&quot;id&quot;:&quot;13697996&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.21&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-159&quot;,&quot;id&quot;:&quot;13697825&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.22&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-160&quot;,&quot;id&quot;:&quot;13697917&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.23&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-161&quot;,&quot;id&quot;:&quot;13697836&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.24&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-162&quot;,&quot;id&quot;:&quot;13697918&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.25&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-163&quot;,&quot;id&quot;:&quot;13697823&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.26&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-164&quot;,&quot;id&quot;:&quot;13697883&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.27&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-165&quot;,&quot;id&quot;:&quot;13697919&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.28&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-166&quot;,&quot;id&quot;:&quot;13697828&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-167&quot;,&quot;id&quot;:&quot;13697920&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.30&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-168&quot;,&quot;id&quot;:&quot;13697921&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.31&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-169&quot;,&quot;id&quot;:&quot;13697882&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.32&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-170&quot;,&quot;id&quot;:&quot;13697806&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.33&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-171&quot;,&quot;id&quot;:&quot;13697826&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.34&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-172&quot;,&quot;id&quot;:&quot;13697736&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.35&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-173&quot;,&quot;id&quot;:&quot;13697922&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.36&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-174&quot;,&quot;id&quot;:&quot;13697852&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.37&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-175&quot;,&quot;id&quot;:&quot;13697753&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.38&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-176&quot;,&quot;id&quot;:&quot;13697923&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.39&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-177&quot;,&quot;id&quot;:&quot;13697694&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.40%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.40&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-178&quot;,&quot;id&quot;:&quot;13697924&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.41%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.41&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-179&quot;,&quot;id&quot;:&quot;13697925&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.42%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.42&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-180&quot;,&quot;id&quot;:&quot;13697926&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.43%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.43&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-181&quot;,&quot;id&quot;:&quot;13697712&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.44%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.44&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-182&quot;,&quot;id&quot;:&quot;13697927&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.45%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.45&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-183&quot;,&quot;id&quot;:&quot;13697747&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.46&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-184&quot;,&quot;id&quot;:&quot;13697857&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.47%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.47&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-185&quot;,&quot;id&quot;:&quot;13697928&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.48%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.48&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-186&quot;,&quot;id&quot;:&quot;13697755&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.49%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.49&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-187&quot;,&quot;id&quot;:&quot;13697809&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.50%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.50&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-188&quot;,&quot;id&quot;:&quot;13697997&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.51%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.51&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-189&quot;,&quot;id&quot;:&quot;13697929&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.52%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.52&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-190&quot;,&quot;id&quot;:&quot;13697930&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.53%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.53&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-191&quot;,&quot;id&quot;:&quot;13697931&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.54%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.54&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-192&quot;,&quot;id&quot;:&quot;13697869&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.55%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.55&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-193&quot;,&quot;id&quot;:&quot;13697932&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.56%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.56&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-194&quot;,&quot;id&quot;:&quot;13697998&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.57%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.57&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-195&quot;,&quot;id&quot;:&quot;13697808&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.58%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.58&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-196&quot;,&quot;id&quot;:&quot;13697933&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.59%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.59&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-197&quot;,&quot;id&quot;:&quot;13697934&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.60%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.60&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-198&quot;,&quot;id&quot;:&quot;13697999&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.61%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.61&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-199&quot;,&quot;id&quot;:&quot;13698000&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.62%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.16.62&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-200&quot;,&quot;id&quot;:&quot;13697885&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-201&quot;,&quot;id&quot;:&quot;13697810&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-202&quot;,&quot;id&quot;:&quot;13697873&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-203&quot;,&quot;id&quot;:&quot;13697876&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-204&quot;,&quot;id&quot;:&quot;13697847&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-205&quot;,&quot;id&quot;:&quot;13698001&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-206&quot;,&quot;id&quot;:&quot;13698002&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-207&quot;,&quot;id&quot;:&quot;13697684&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-208&quot;,&quot;id&quot;:&quot;13697858&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-209&quot;,&quot;id&quot;:&quot;13697726&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-210&quot;,&quot;id&quot;:&quot;13697767&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-211&quot;,&quot;id&quot;:&quot;13697741&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-212&quot;,&quot;id&quot;:&quot;13697799&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-213&quot;,&quot;id&quot;:&quot;13698003&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-214&quot;,&quot;id&quot;:&quot;13697935&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-215&quot;,&quot;id&quot;:&quot;13697738&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-216&quot;,&quot;id&quot;:&quot;13697700&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-217&quot;,&quot;id&quot;:&quot;13697829&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-218&quot;,&quot;id&quot;:&quot;13697936&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-219&quot;,&quot;id&quot;:&quot;13697693&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-220&quot;,&quot;id&quot;:&quot;13698004&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.17.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-221&quot;,&quot;id&quot;:&quot;13697743&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-222&quot;,&quot;id&quot;:&quot;13698005&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-223&quot;,&quot;id&quot;:&quot;13698006&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-224&quot;,&quot;id&quot;:&quot;13697722&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-225&quot;,&quot;id&quot;:&quot;13697686&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-226&quot;,&quot;id&quot;:&quot;13697737&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-227&quot;,&quot;id&quot;:&quot;13697732&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-228&quot;,&quot;id&quot;:&quot;13698007&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18:rc7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-229&quot;,&quot;id&quot;:&quot;13697937&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-230&quot;,&quot;id&quot;:&quot;13697787&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-231&quot;,&quot;id&quot;:&quot;13697886&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-232&quot;,&quot;id&quot;:&quot;13697752&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-233&quot;,&quot;id&quot;:&quot;13697785&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-234&quot;,&quot;id&quot;:&quot;13697803&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-235&quot;,&quot;id&quot;:&quot;13697938&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-236&quot;,&quot;id&quot;:&quot;13697692&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.18.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-237&quot;,&quot;id&quot;:&quot;13697879&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-238&quot;,&quot;id&quot;:&quot;13697939&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-239&quot;,&quot;id&quot;:&quot;13697834&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-240&quot;,&quot;id&quot;:&quot;13698008&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-241&quot;,&quot;id&quot;:&quot;13698009&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-242&quot;,&quot;id&quot;:&quot;13697701&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-243&quot;,&quot;id&quot;:&quot;13697784&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-244&quot;,&quot;id&quot;:&quot;13697814&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-245&quot;,&quot;id&quot;:&quot;13697781&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-246&quot;,&quot;id&quot;:&quot;13697782&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-247&quot;,&quot;id&quot;:&quot;13698010&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-248&quot;,&quot;id&quot;:&quot;13698011&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.19.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-249&quot;,&quot;id&quot;:&quot;13697940&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-250&quot;,&quot;id&quot;:&quot;13697841&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-251&quot;,&quot;id&quot;:&quot;13697691&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-252&quot;,&quot;id&quot;:&quot;13697941&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-253&quot;,&quot;id&quot;:&quot;13697942&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-254&quot;,&quot;id&quot;:&quot;13697943&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-255&quot;,&quot;id&quot;:&quot;13698012&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-256&quot;,&quot;id&quot;:&quot;13697769&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-257&quot;,&quot;id&quot;:&quot;13697682&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-258&quot;,&quot;id&quot;:&quot;13698013&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-259&quot;,&quot;id&quot;:&quot;13697859&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-260&quot;,&quot;id&quot;:&quot;13697685&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-261&quot;,&quot;id&quot;:&quot;13697944&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-262&quot;,&quot;id&quot;:&quot;13697945&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-263&quot;,&quot;id&quot;:&quot;13697822&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-264&quot;,&quot;id&quot;:&quot;13697717&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-265&quot;,&quot;id&quot;:&quot;13698014&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.15&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-266&quot;,&quot;id&quot;:&quot;13697862&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.16&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-267&quot;,&quot;id&quot;:&quot;13697776&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.17&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-268&quot;,&quot;id&quot;:&quot;13697818&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.18&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-269&quot;,&quot;id&quot;:&quot;13697874&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.19&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-270&quot;,&quot;id&quot;:&quot;13697946&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.20&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-271&quot;,&quot;id&quot;:&quot;13697851&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.20.21&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-272&quot;,&quot;id&quot;:&quot;13697788&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-273&quot;,&quot;id&quot;:&quot;13697695&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-274&quot;,&quot;id&quot;:&quot;13697947&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-275&quot;,&quot;id&quot;:&quot;13697819&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-276&quot;,&quot;id&quot;:&quot;13697696&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-277&quot;,&quot;id&quot;:&quot;13697713&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-278&quot;,&quot;id&quot;:&quot;13697707&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-279&quot;,&quot;id&quot;:&quot;13698015&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:git7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-280&quot;,&quot;id&quot;:&quot;13697868&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-281&quot;,&quot;id&quot;:&quot;13698016&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-282&quot;,&quot;id&quot;:&quot;13697735&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-283&quot;,&quot;id&quot;:&quot;13697718&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-284&quot;,&quot;id&quot;:&quot;13697861&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21:rc7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-285&quot;,&quot;id&quot;:&quot;13697733&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-286&quot;,&quot;id&quot;:&quot;13697805&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-287&quot;,&quot;id&quot;:&quot;13697948&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-288&quot;,&quot;id&quot;:&quot;13697949&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-289&quot;,&quot;id&quot;:&quot;13697815&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-290&quot;,&quot;id&quot;:&quot;13697830&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-291&quot;,&quot;id&quot;:&quot;13697761&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.21.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-292&quot;,&quot;id&quot;:&quot;13697950&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-293&quot;,&quot;id&quot;:&quot;13697770&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22:rc6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-294&quot;,&quot;id&quot;:&quot;13698017&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-295&quot;,&quot;id&quot;:&quot;13697763&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-296&quot;,&quot;id&quot;:&quot;13698018&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-297&quot;,&quot;id&quot;:&quot;13697880&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-298&quot;,&quot;id&quot;:&quot;13697719&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-299&quot;,&quot;id&quot;:&quot;13698019&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-300&quot;,&quot;id&quot;:&quot;13697877&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-301&quot;,&quot;id&quot;:&quot;13697844&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-302&quot;,&quot;id&quot;:&quot;13698020&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-303&quot;,&quot;id&quot;:&quot;13697951&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-304&quot;,&quot;id&quot;:&quot;13697952&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-305&quot;,&quot;id&quot;:&quot;13697953&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-306&quot;,&quot;id&quot;:&quot;13697748&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-307&quot;,&quot;id&quot;:&quot;13697954&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-308&quot;,&quot;id&quot;:&quot;13698021&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.15&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-309&quot;,&quot;id&quot;:&quot;13697689&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.16&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-310&quot;,&quot;id&quot;:&quot;13698022&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.17&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-311&quot;,&quot;id&quot;:&quot;13697955&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.18&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-312&quot;,&quot;id&quot;:&quot;13697864&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.19&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-313&quot;,&quot;id&quot;:&quot;13698023&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.22.20&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-314&quot;,&quot;id&quot;:&quot;13697871&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-315&quot;,&quot;id&quot;:&quot;13697956&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-316&quot;,&quot;id&quot;:&quot;13697957&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-317&quot;,&quot;id&quot;:&quot;13697872&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-318&quot;,&quot;id&quot;:&quot;13697790&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-319&quot;,&quot;id&quot;:&quot;13697958&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-320&quot;,&quot;id&quot;:&quot;13697878&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-321&quot;,&quot;id&quot;:&quot;13697688&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-322&quot;,&quot;id&quot;:&quot;13698024&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-323&quot;,&quot;id&quot;:&quot;13698025&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-324&quot;,&quot;id&quot;:&quot;13697746&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-325&quot;,&quot;id&quot;:&quot;13697875&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-326&quot;,&quot;id&quot;:&quot;13697842&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.11&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-327&quot;,&quot;id&quot;:&quot;13698026&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.12&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-328&quot;,&quot;id&quot;:&quot;13697959&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.13&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-329&quot;,&quot;id&quot;:&quot;13697729&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.14&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-330&quot;,&quot;id&quot;:&quot;13697960&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.15&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-331&quot;,&quot;id&quot;:&quot;13697835&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.16&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-332&quot;,&quot;id&quot;:&quot;13697766&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.23.17&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-333&quot;,&quot;id&quot;:&quot;13697961&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-334&quot;,&quot;id&quot;:&quot;13697811&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-335&quot;,&quot;id&quot;:&quot;13697849&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-336&quot;,&quot;id&quot;:&quot;13697962&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24:rc3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-337&quot;,&quot;id&quot;:&quot;13697751&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24:rc4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-338&quot;,&quot;id&quot;:&quot;13697802&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24:rc5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-339&quot;,&quot;id&quot;:&quot;13697775&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-340&quot;,&quot;id&quot;:&quot;13697768&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-341&quot;,&quot;id&quot;:&quot;13697731&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-342&quot;,&quot;id&quot;:&quot;13698027&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-343&quot;,&quot;id&quot;:&quot;13697963&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-344&quot;,&quot;id&quot;:&quot;13697964&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel:2.6.24.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-345&quot;,&quot;id&quot;:&quot;13697965&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:linux:linux_kernel&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-346&quot;,&quot;id&quot;:&quot;13697734&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 2.6.24.7 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;2.6.24.7&quot;,&quot;rangeId&quot;:&quot;31871&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-config-2&quot;,&quot;totalCpeCount&quot;:4,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Avmware%3Avcenter%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:vmware:vcenter:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:vmware:vcenter:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-0&quot;,&quot;id&quot;:&quot;13698028&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Avmware%3Avirtualcenter%3A2.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:vmware:virtualcenter:2.0.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-1&quot;,&quot;id&quot;:&quot;13698029&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Avmware%3Avirtualcenter%3A2.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:vmware:virtualcenter:2.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-2&quot;,&quot;id&quot;:&quot;13698030&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amicrosoft%3Awindows%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:microsoft:windows:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-1-0&quot;,&quot;id&quot;:&quot;13698031&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:3,&quot;dataTestId&quot;:&quot;vuln-software-config-3&quot;,&quot;totalCpeCount&quot;:5,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Avmware%3Aserver%3A2.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:vmware:server:2.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-0&quot;,&quot;id&quot;:&quot;13698032&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Avmware%3Aesx%3A2.5.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:vmware:esx:2.5.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-1&quot;,&quot;id&quot;:&quot;13698033&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Avmware%3Aesx%3A3.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:vmware:esx:3.0.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-2&quot;,&quot;id&quot;:&quot;13698034&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Avmware%3Aesx%3A3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:vmware:esx:3.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-3&quot;,&quot;id&quot;:&quot;13698035&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Avmware%3Aesx%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:vmware:esx:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-4&quot;,&quot;id&quot;:&quot;13698036&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:4,&quot;dataTestId&quot;:&quot;vuln-software-config-4&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Avmware%3Avma%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:vmware:vma:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-0-0&quot;,&quot;id&quot;:&quot;13698037&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-1-0&quot;,&quot;id&quot;:&quot;13698038&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 9 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-0">11/20/2024 8:00:54 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://openwall.com/lists/oss-security/2009/03/11/2</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/33758</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/37471</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2009-0326.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/bid/34084</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securitytracker.com/id?1021958</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2009/3316</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=485163</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-1">5/13/2024 10:04:55 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-2">2/12/2023 9:19:41 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Description</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">CVE-2009-0778 kernel: rt_cache leak leads to lack of network connectivity</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an &quot;rt_cache leak.&quot;</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">CVSS V2</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:N/A:C)</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2009:0326 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2010:0079 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2009-0778 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-3">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-3">2/02/2023 12:15:56 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Changed</td>
<td
data-testid="vuln-change-history-3-type">Description</td>
<td data-testid="vuln-change-history-3-old">
<pre style="word-break: break-all !important">The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an &quot;rt_cache leak.&quot;</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">CVE-2009-0778 kernel: rt_cache leak leads to lack of network connectivity</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">CVSS V2</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:N/A:C)</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2009:0326 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2010:0079 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2009-0778 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Removed</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 [Mailing List, Patch, Vendor Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-3-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-4">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-4">8/28/2020 12:06:43 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">CPE Configuration</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:a:vmware:vcenter:4.0:*:*:*:*:*:*:*
*cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">CPE Configuration</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">CPE Configuration</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
*cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
*cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 Mailing List, Patch, Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://openwall.com/lists/oss-security/2009/03/11/2 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://openwall.com/lists/oss-security/2009/03/11/2 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://secunia.com/advisories/33758 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/33758 Broken Link</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://secunia.com/advisories/37471 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/37471 Broken Link</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 Broken Link</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2009-0326.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2009-0326.html Broken Link</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.securityfocus.com/bid/34084 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/bid/34084 Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.securitytracker.com/id?1021958 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.securitytracker.com/id?1021958 Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.vmware.com/security/advisories/VMSA-2009-0016.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2009/3316 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2009/3316 Broken Link</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=485163 Exploit</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=485163 Exploit, Issue Tracking, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199 Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Reference Type</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-5">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-5">10/10/2018 3:31:01 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Added</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
</td>
<td data-testid="vuln-change-history-5-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Removed</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-5-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-6">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-6">9/28/2017 9:34:01 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Added</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Added</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Removed</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10215 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-6-new">
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Removed</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7867 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-6-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-7">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-7">8/16/2017 9:30:00 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Added</td>
<td
data-testid="vuln-change-history-7-type">Reference</td>
<td data-testid="vuln-change-history-7-old">
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/49199 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Removed</td>
<td
data-testid="vuln-change-history-7-type">Reference</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">http://xforce.iss.net/xforce/xfdb/49199 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-8">Initial CVE Analysis</span> <span
data-testid="vuln-change-history-date-8">3/12/2009 1:00:00 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2009-0778">CVE-2009-0778</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">03/12/2009</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">11/20/2024</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Red Hat, Inc.</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="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" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>