3260 lines
441 KiB
Text
3260 lines
441 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2009-2406</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: false,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2009-2406</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss3-panel-score-na">N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss3-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value=""/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2009-2406&vector=(AV:L/AC:M/Au:N/C:C/I:C/A:C)&version=2.0&source=NIST" class="label label-warning">6.9 MEDIUM</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:L/AC:M/Au:N/C:C/I:C/A:C)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>6.9 </span><span data-testid='vuln-cvssv2-base-score-severity'>MEDIUM</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:L/AC:M/Au:N/C:C/I:C/A:C)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>10.0</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>3.4</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Local</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Medium</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>Complete</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>Complete</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Complete</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows unauthorized disclosure of information<br/>Allows unauthorized modification<br/>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
<div id="vulnCommentsPanel"
|
||
data-testid="vuln-comments-container">
|
||
<h3>
|
||
Vendor Statements (<a href="/vuln/vendor-comments"
|
||
target="_blank" rel="noopener noreferrer">disclaimer</a>)
|
||
</h3>
|
||
|
||
<div class="bs-callout bs-callout-info" data-testid="vuln-comments-row-0">
|
||
<h4>Official Statement from Red Hat (08/18/2009)</h4>
|
||
<p>The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.
|
||
|
||
Red Hat Enterprise Linux 5 was vulnerable to this issue and was addressed via: https://rhn.redhat.com/errata/RHSA-2009-1193.html</div>
|
||
|
||
</div>
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e"
|
||
target="_blank" rel="noopener noreferrer">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e"
|
||
target="_blank" rel="noopener noreferrer">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
|
||
target="_blank" rel="noopener noreferrer">http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
|
||
target="_blank" rel="noopener noreferrer">http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="http://risesecurity.org/advisories/RISE-2009002.txt"
|
||
target="_blank" rel="noopener noreferrer">http://risesecurity.org/advisories/RISE-2009002.txt</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="http://risesecurity.org/advisories/RISE-2009002.txt"
|
||
target="_blank" rel="noopener noreferrer">http://risesecurity.org/advisories/RISE-2009002.txt</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="http://secunia.com/advisories/35985"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/35985</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="http://secunia.com/advisories/35985"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/35985</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="http://secunia.com/advisories/36045"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36045</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="http://secunia.com/advisories/36045"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36045</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-10">
|
||
<td data-testid="vuln-hyperlinks-link-10">
|
||
<a
|
||
href="http://secunia.com/advisories/36051"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36051</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-10">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-11">
|
||
<td data-testid="vuln-hyperlinks-link-11">
|
||
<a
|
||
href="http://secunia.com/advisories/36051"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36051</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-11">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-12">
|
||
<td data-testid="vuln-hyperlinks-link-12">
|
||
<a
|
||
href="http://secunia.com/advisories/36054"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36054</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-12">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-13">
|
||
<td data-testid="vuln-hyperlinks-link-13">
|
||
<a
|
||
href="http://secunia.com/advisories/36054"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36054</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-13">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-14">
|
||
<td data-testid="vuln-hyperlinks-link-14">
|
||
<a
|
||
href="http://secunia.com/advisories/36116"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36116</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-14">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-15">
|
||
<td data-testid="vuln-hyperlinks-link-15">
|
||
<a
|
||
href="http://secunia.com/advisories/36116"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36116</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-15">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-16">
|
||
<td data-testid="vuln-hyperlinks-link-16">
|
||
<a
|
||
href="http://secunia.com/advisories/36131"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36131</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-16">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-17">
|
||
<td data-testid="vuln-hyperlinks-link-17">
|
||
<a
|
||
href="http://secunia.com/advisories/36131"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/36131</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-17">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-18">
|
||
<td data-testid="vuln-hyperlinks-link-18">
|
||
<a
|
||
href="http://secunia.com/advisories/37471"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/37471</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-18">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-19">
|
||
<td data-testid="vuln-hyperlinks-link-19">
|
||
<a
|
||
href="http://secunia.com/advisories/37471"
|
||
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/37471</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-19">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-20">
|
||
<td data-testid="vuln-hyperlinks-link-20">
|
||
<a
|
||
href="http://www.debian.org/security/2009/dsa-1844"
|
||
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2009/dsa-1844</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-20">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-21">
|
||
<td data-testid="vuln-hyperlinks-link-21">
|
||
<a
|
||
href="http://www.debian.org/security/2009/dsa-1844"
|
||
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2009/dsa-1844</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-21">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-22">
|
||
<td data-testid="vuln-hyperlinks-link-22">
|
||
<a
|
||
href="http://www.debian.org/security/2009/dsa-1845"
|
||
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2009/dsa-1845</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-22">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-23">
|
||
<td data-testid="vuln-hyperlinks-link-23">
|
||
<a
|
||
href="http://www.debian.org/security/2009/dsa-1845"
|
||
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2009/dsa-1845</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-23">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-24">
|
||
<td data-testid="vuln-hyperlinks-link-24">
|
||
<a
|
||
href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
|
||
target="_blank" rel="noopener noreferrer">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-24">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-25">
|
||
<td data-testid="vuln-hyperlinks-link-25">
|
||
<a
|
||
href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
|
||
target="_blank" rel="noopener noreferrer">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-25">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-26">
|
||
<td data-testid="vuln-hyperlinks-link-26">
|
||
<a
|
||
href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
|
||
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDVSA-2011:029</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-26">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-27">
|
||
<td data-testid="vuln-hyperlinks-link-27">
|
||
<a
|
||
href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
|
||
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDVSA-2011:029</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-27">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-28">
|
||
<td data-testid="vuln-hyperlinks-link-28">
|
||
<a
|
||
href="http://www.redhat.com/support/errata/RHSA-2009-1193.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2009-1193.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-28">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-29">
|
||
<td data-testid="vuln-hyperlinks-link-29">
|
||
<a
|
||
href="http://www.redhat.com/support/errata/RHSA-2009-1193.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2009-1193.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-29">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-30">
|
||
<td data-testid="vuln-hyperlinks-link-30">
|
||
<a
|
||
href="http://www.securityfocus.com/archive/1/505334/100/0/threaded"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/505334/100/0/threaded</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-30">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-31">
|
||
<td data-testid="vuln-hyperlinks-link-31">
|
||
<a
|
||
href="http://www.securityfocus.com/archive/1/505334/100/0/threaded"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/505334/100/0/threaded</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-31">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-32">
|
||
<td data-testid="vuln-hyperlinks-link-32">
|
||
<a
|
||
href="http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/507985/100/0/threaded</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-32">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-33">
|
||
<td data-testid="vuln-hyperlinks-link-33">
|
||
<a
|
||
href="http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/507985/100/0/threaded</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-33">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-34">
|
||
<td data-testid="vuln-hyperlinks-link-34">
|
||
<a
|
||
href="http://www.securityfocus.com/bid/35851"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/35851</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-34">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-35">
|
||
<td data-testid="vuln-hyperlinks-link-35">
|
||
<a
|
||
href="http://www.securityfocus.com/bid/35851"
|
||
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/35851</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-35">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-36">
|
||
<td data-testid="vuln-hyperlinks-link-36">
|
||
<a
|
||
href="http://www.securitytracker.com/id?1022663"
|
||
target="_blank" rel="noopener noreferrer">http://www.securitytracker.com/id?1022663</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-36">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-37">
|
||
<td data-testid="vuln-hyperlinks-link-37">
|
||
<a
|
||
href="http://www.securitytracker.com/id?1022663"
|
||
target="_blank" rel="noopener noreferrer">http://www.securitytracker.com/id?1022663</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-37">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-38">
|
||
<td data-testid="vuln-hyperlinks-link-38">
|
||
<a
|
||
href="http://www.ubuntu.com/usn/usn-807-1"
|
||
target="_blank" rel="noopener noreferrer">http://www.ubuntu.com/usn/usn-807-1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-38">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-39">
|
||
<td data-testid="vuln-hyperlinks-link-39">
|
||
<a
|
||
href="http://www.ubuntu.com/usn/usn-807-1"
|
||
target="_blank" rel="noopener noreferrer">http://www.ubuntu.com/usn/usn-807-1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-39">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-40">
|
||
<td data-testid="vuln-hyperlinks-link-40">
|
||
<a
|
||
href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-40">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-41">
|
||
<td data-testid="vuln-hyperlinks-link-41">
|
||
<a
|
||
href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-41">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-42">
|
||
<td data-testid="vuln-hyperlinks-link-42">
|
||
<a
|
||
href="http://www.vupen.com/english/advisories/2009/2041"
|
||
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/2041</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-42">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-43">
|
||
<td data-testid="vuln-hyperlinks-link-43">
|
||
<a
|
||
href="http://www.vupen.com/english/advisories/2009/2041"
|
||
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/2041</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-43">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-44">
|
||
<td data-testid="vuln-hyperlinks-link-44">
|
||
<a
|
||
href="http://www.vupen.com/english/advisories/2009/3316"
|
||
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/3316</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-44">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-45">
|
||
<td data-testid="vuln-hyperlinks-link-45">
|
||
<a
|
||
href="http://www.vupen.com/english/advisories/2009/3316"
|
||
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2009/3316</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-45">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-46">
|
||
<td data-testid="vuln-hyperlinks-link-46">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-46">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-47">
|
||
<td data-testid="vuln-hyperlinks-link-47">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-47">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-48">
|
||
<td data-testid="vuln-hyperlinks-link-48">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-48">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-49">
|
||
<td data-testid="vuln-hyperlinks-link-49">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-49">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-50">
|
||
<td data-testid="vuln-hyperlinks-link-50">
|
||
<a
|
||
href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-50">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-51">
|
||
<td data-testid="vuln-hyperlinks-link-51">
|
||
<a
|
||
href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-51">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-52">
|
||
<td data-testid="vuln-hyperlinks-link-52">
|
||
<a
|
||
href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-52">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-53">
|
||
<td data-testid="vuln-hyperlinks-link-53">
|
||
<a
|
||
href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-53">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/119.html" target="_blank" rel="noopener noreferrer">CWE-119</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2009-2406"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":414,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Alinux%3Akernel%3A2.6.24.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:linux:kernel:2.6.24.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"13730124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Alinux%3Akernel%3A2.6.25.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:linux:kernel:2.6.25.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1","id":"13730198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2","id":"13729979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-3","id":"13730208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-4","id":"13730130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3A*%3A64-bit_x86%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0::64-bit_x86","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-5","id":"13730168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3A*%3Aitanium_ia64_montecito%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0::itanium_ia64_montecito","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-6","id":"13729908","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-7","id":"13730084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest10%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-8","id":"13730141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest11%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-9","id":"13730046","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-10","id":"13730018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-11","id":"13730297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-12","id":"13730145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-13","id":"13730024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-14","id":"13730093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-15","id":"13730233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest8%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-16","id":"13730258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3Atest9%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0:test9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-17","id":"13730170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-18","id":"13729944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.1:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-19","id":"13730221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.1:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-20","id":"13730060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.1:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-21","id":"13730044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-22","id":"13730015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-23","id":"13730146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-24","id":"13730268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-25","id":"13730049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2.27.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2.27.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-26","id":"13730098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-27","id":"13730021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-28","id":"13730273","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-29","id":"13729959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-30","id":"13730078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-31","id":"13730274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-32","id":"13729990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.4:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-33","id":"13729936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.4:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-34","id":"13730052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.4:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-35","id":"13729909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-36","id":"13729938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.5:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-37","id":"13730161","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.5:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-38","id":"13730315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.5:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-39","id":"13730275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-40","id":"13730295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.6:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-41","id":"13730314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.6:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-42","id":"13730162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.6:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-43","id":"13730040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-44","id":"13730257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.7:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-45","id":"13730000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.7:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-46","id":"13730089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.7:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-47","id":"13729955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-48","id":"13730074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-49","id":"13730045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-50","id":"13730271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-51","id":"13730311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-52","id":"13730013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-53","id":"13730296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-54","id":"13730050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3A386%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::386","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-55","id":"13729935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3A686%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::686","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-56","id":"13730230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3A686_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::686_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-57","id":"13729964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Aamd64%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-58","id":"13730099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Aamd64_k8%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-59","id":"13729907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Aamd64_k8_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-60","id":"13730100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Aamd64_xeon%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_xeon","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-61","id":"13730231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Ak7%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::k7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-62","id":"13729930","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Ak7_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::k7_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-63","id":"13729951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apower3%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::power3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-64","id":"13729952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apower3_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::power3_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-65","id":"13730247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apower4%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::power4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-66","id":"13730248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apower4_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::power4_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-67","id":"13729978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apowerpc%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-68","id":"13730005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3Apowerpc_smp%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc_smp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-69","id":"13730317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-70","id":"13730220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3A2.6.20%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9:2.6.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-71","id":"13730245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-72","id":"13730016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-73","id":"13730175","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-74","id":"13730001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-75","id":"13730157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-76","id":"13730039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.10:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-77","id":"13730185","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.10:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-78","id":"13730109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.10:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-79","id":"13729942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-80","id":"13729915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11::x86_64","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-81","id":"13730241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-82","id":"13730171","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-83","id":"13730227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-84","id":"13729904","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-85","id":"13730063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-86","id":"13730303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-87","id":"13730278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-88","id":"13729937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-89","id":"13730113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-90","id":"13730189","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-91","id":"13729998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-92","id":"13730027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-93","id":"13730279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-94","id":"13729965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-95","id":"13730108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-96","id":"13729941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-97","id":"13730025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-98","id":"13730209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11_rc1_bk6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11_rc1_bk6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-99","id":"13729972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-100","id":"13730199","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-101","id":"13729928","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-102","id":"13730059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-103","id":"13730095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-104","id":"13729929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-105","id":"13730043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-106","id":"13730304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-107","id":"13730106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-108","id":"13730131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-109","id":"13730114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-110","id":"13730115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-111","id":"13730086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-112","id":"13730280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-113","id":"13729932","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-114","id":"13730306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-115","id":"13729960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-116","id":"13730038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-117","id":"13729994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-118","id":"13730265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-119","id":"13730305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-120","id":"13729943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-121","id":"13730033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-122","id":"13730020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-123","id":"13730200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-124","id":"13730042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-125","id":"13729963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-126","id":"13730116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-127","id":"13730055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-128","id":"13729977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-129","id":"13730172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-130","id":"13729934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-131","id":"13730048","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-132","id":"13730237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-133","id":"13730228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-134","id":"13730080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-135","id":"13730201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-136","id":"13730034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-137","id":"13729976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-138","id":"13730041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-139","id":"13730105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-140","id":"13729956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-141","id":"13730190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-142","id":"13730240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-143","id":"13730102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-144","id":"13730070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-145","id":"13729962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-146","id":"13730006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-147","id":"13730239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-148","id":"13730238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-149","id":"13729997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-150","id":"13730187","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-151","id":"13729939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-152","id":"13730202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-153","id":"13730203","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-154","id":"13729995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-155","id":"13730087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-156","id":"13730079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-157","id":"13730117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-158","id":"13729958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-159","id":"13730309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-160","id":"13730310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-161","id":"13730148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-162","id":"13730085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-163","id":"13729949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-164","id":"13730010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-165","id":"13730282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-166","id":"13730092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-167","id":"13729983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-168","id":"13730308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-169","id":"13729947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-170","id":"13730285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-171","id":"13729948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-172","id":"13729927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-173","id":"13730118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-174","id":"13730064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-175","id":"13730281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-176","id":"13730023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-177","id":"13730067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-178","id":"13729991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-179","id":"13729918","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-180","id":"13730191","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-181","id":"13729981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-182","id":"13730192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-183","id":"13730283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-184","id":"13730071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-185","id":"13730125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-186","id":"13730083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-187","id":"13730132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-188","id":"13730069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-189","id":"13730119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-190","id":"13730193","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-191","id":"13730075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-192","id":"13730177","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-193","id":"13730266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-194","id":"13730126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-195","id":"13730054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-196","id":"13730073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-197","id":"13729969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-198","id":"13730307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-199","id":"13730104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-200","id":"13730029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-201","id":"13730284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-202","id":"13729922","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.40%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.40","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-203","id":"13730127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.41%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.41","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-204","id":"13730188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.42%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.42","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-205","id":"13730133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.43%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.43","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-206","id":"13729945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.44%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.44","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-207","id":"13730210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.45%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.45","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-208","id":"13730036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-209","id":"13730110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.47%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.47","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-210","id":"13730178","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.48%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.48","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-211","id":"13730026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.49%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.49","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-212","id":"13730057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.50%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.50","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-213","id":"13730204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.51%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.51","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-214","id":"13730128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.52%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.52","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-215","id":"13730156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.53%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.53","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-216","id":"13730205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.54%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.54","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-217","id":"13730134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.55%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.55","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-218","id":"13730135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.56%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.56","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-219","id":"13730215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.57%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.57","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-220","id":"13730056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.58%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.58","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-221","id":"13730138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.59%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.59","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-222","id":"13730254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.60%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.60","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-223","id":"13730253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.61%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.61","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-224","id":"13730217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.62%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.62","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-225","id":"13730183","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16_rc7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16_rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-226","id":"13730244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-227","id":"13730058","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-228","id":"13730173","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-229","id":"13730147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-230","id":"13730094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-231","id":"13730243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-232","id":"13730270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-233","id":"13729910","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-234","id":"13730111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-235","id":"13729961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-236","id":"13729984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-237","id":"13729980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-238","id":"13730047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-239","id":"13730291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-240","id":"13730292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-241","id":"13729975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-242","id":"13729931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-243","id":"13730076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-244","id":"13730137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-245","id":"13729921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-246","id":"13730252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-247","id":"13729982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-248","id":"13730286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3A*%3Ax86_32%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18::x86_32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-249","id":"13730072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-250","id":"13730288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-251","id":"13729957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-252","id":"13729913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-253","id":"13729971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-254","id":"13729966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-255","id":"13730207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-256","id":"13730213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-257","id":"13730155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-258","id":"13730011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-259","id":"13730165","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-260","id":"13730030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-261","id":"13730009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-262","id":"13730051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-263","id":"13730196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-264","id":"13729920","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-265","id":"13730182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-266","id":"13730123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-267","id":"13730082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-268","id":"13730242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-269","id":"13730267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-270","id":"13729933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-271","id":"13730008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-272","id":"13730061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-273","id":"13730002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-274","id":"13730004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-275","id":"13730206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-276","id":"13730211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-277","id":"13730180","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-278","id":"13730088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-279","id":"13729919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-280","id":"13730197","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-281","id":"13730214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-282","id":"13730129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-283","id":"13730212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-284","id":"13729987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-285","id":"13729905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-286","id":"13730289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-287","id":"13730112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-288","id":"13729912","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-289","id":"13730121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-290","id":"13730122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-291","id":"13730068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-292","id":"13729950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-293","id":"13730250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-294","id":"13730164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-295","id":"13729996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-296","id":"13730065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-297","id":"13730136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-298","id":"13730179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-299","id":"13730103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-300","id":"13730012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-301","id":"13729925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-302","id":"13730269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-303","id":"13730066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-304","id":"13729926","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-305","id":"13729946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-306","id":"13729940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-307","id":"13730312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Agit7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:git7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-308","id":"13730159","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-309","id":"13730246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-310","id":"13729968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-311","id":"13729953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-312","id":"13730150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-313","id":"13729967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-314","id":"13730053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-315","id":"13730195","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-316","id":"13730120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-317","id":"13730062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-318","id":"13730077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-319","id":"13730019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-320","id":"13730287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-321","id":"13729988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-322","id":"13730313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-323","id":"13730017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-324","id":"13730218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-325","id":"13730181","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-326","id":"13729954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-327","id":"13730272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-328","id":"13730149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.6%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:x86_64:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.6::x86_64","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-329","id":"13729986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-330","id":"13730090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-331","id":"13730167","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-332","id":"13730139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-333","id":"13730035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-334","id":"13730143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-335","id":"13730219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-336","id":"13729917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-337","id":"13730194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-338","id":"13730184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-339","id":"13730166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-340","id":"13730290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-341","id":"13730142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-342","id":"13729973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-343","id":"13730251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-344","id":"13730174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-345","id":"13730160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-346","id":"13730158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-347","id":"13730014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-348","id":"13730276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-349","id":"13730151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-350","id":"13729916","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-351","id":"13730316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-352","id":"13730277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-353","id":"13729974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-354","id":"13730176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-355","id":"13730163","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.24:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-356","id":"13730229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.24:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-357","id":"13730031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-358","id":"13730299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-359","id":"13730260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-360","id":"13729985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-361","id":"13730222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-362","id":"13730022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-363","id":"13730037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-364","id":"13730091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc8%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-365","id":"13730152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27%3Arc9%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27:rc9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-366","id":"13730259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-367","id":"13730226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-368","id":"13729923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-369","id":"13730003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-370","id":"13730225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-371","id":"13730302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-372","id":"13730224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-373","id":"13730097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-374","id":"13730107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-375","id":"13729992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-376","id":"13729970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-377","id":"13730144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-378","id":"13730255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.27.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.27.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-379","id":"13730216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-380","id":"13730298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Agit7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:git7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-381","id":"13729911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-382","id":"13730101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-383","id":"13730294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-384","id":"13730256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-385","id":"13729906","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-386","id":"13730081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-387","id":"13730154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28%3Arc7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28:rc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-388","id":"13730186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-389","id":"13730264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-390","id":"13729999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-391","id":"13730169","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-392","id":"13729989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-393","id":"13730007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-394","id":"13730263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-395","id":"13730236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-396","id":"13730140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-397","id":"13730234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.28.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.28.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-398","id":"13730293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-399","id":"13730032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3Agit1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29:git1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-400","id":"13730301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-401","id":"13730262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-402","id":"13730153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3Arc2_git7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29:rc2_git7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-403","id":"13730223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29%3Arc8-kk%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29:rc8-kk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-404","id":"13729914","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-405","id":"13729924","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29.rc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29.rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-406","id":"13730235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29.rc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29.rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-407","id":"13730261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.29.rc2-git1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.29.rc2-git1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-408","id":"13730300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.30%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.30:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-409","id":"13730028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.30.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.30.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-410","id":"13730249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.30.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.30.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-411","id":"13730232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-412","id":"13730096","matchCpes":[],"rangeDescription":" versions up to (including) 2.6.30.3 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.6.30.3","rangeId":"101177","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6_test9_cvs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6_test9_cvs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-413","id":"13729993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 9 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/20/2024 8:04:47 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://risesecurity.org/advisories/RISE-2009002.txt</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/35985</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/36045</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/36051</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/36054</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/36116</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/36131</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://secunia.com/advisories/37471</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.debian.org/security/2009/dsa-1844</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.debian.org/security/2009/dsa-1845</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDVSA-2011:029</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2009-1193.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/505334/100/0/threaded</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/bid/35851</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securitytracker.com/id?1022663</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.ubuntu.com/usn/usn-807-1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2009/2041</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2009/3316</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-1">5/13/2024 10:08:18 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-2">2/12/2023 9:20:15 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Description</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">CVE-2009-2406 kernel: ecryptfs stack overflow in parse_tag_11_packet()</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. (AV:L/AC:L/Au:N/C:C/I:C/A:C)</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2009:1193 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2009-2406 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=512861 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V2 Metadata</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Obtain Admin/Root Access</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V2 Metadata</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Victim must voluntarily interact with attack mechanism</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-3">2/02/2023 12:16:34 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Description</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">CVE-2009-2406 kernel: ecryptfs stack overflow in parse_tag_11_packet()</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. (AV:L/AC:L/Au:N/C:C/I:C/A:C)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2009:1193 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2009-2406 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=512861 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6352a29305373ae6196491e6d4669f301e26492e [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">10/30/2018 12:26:20 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.9:final:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-5">10/30/2018 12:25:10 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.19.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-6">10/10/2018 3:39:53 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/505334/100/0/threaded [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/507985/100/0/threaded [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/archive/1/505334/100/0/threaded [Exploit]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-7">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-7">9/18/2017 9:29:05 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10072 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8246 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-8">Initial CVE Analysis</span> <span
|
||
data-testid="vuln-change-history-date-8">8/03/2009 9:34:00 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2009-2406">CVE-2009-2406</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">07/31/2009</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/20/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Red Hat, Inc.</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|