nist-gov/nvd.nist.gov/vuln/detail/CVE-2005-3624
2025-03-19 03:50:26 +00:00

5738 lines
332 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2005-3624</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: false,
cnaV3Present: false,
nistV2Present: true,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2005-3624</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Current Description </h3>
<p data-testid="vuln-description">The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.</p><br/>
<p>
<a href="#vulnCurrentDescriptionTitle"
style="text-decoration: underline" id="showVulnAnalysis"><i
class="fa fa-plus"></i>View Analysis Description</a>
</p>
<div id="vulnAnalysisDescription" style="display: none;">
<h3 data-testid="vuln-analysis-description-title">Analysis
Description</h3>
<p data-testid="vuln-analysis-description">The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.</p>
</div>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss3-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss3-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV3MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss2CalculatorAnchor"
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2005-3624&amp;vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning">5.0 MEDIUM</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss2-panel-vector"
class="tooltipCvss2NistMetrics">(AV:N/AC:L/Au:N/C:N/I:P/A:N)</span></span> <input type="hidden"
id="nistV2MetricHidden"
value="&lt;span id =&#39;cnaV2Metric&#39; style=&#39;display:none&#39;&gt;&lt;strong style=&#39;font-size:1.2em&#39; &gt;CVSS v2.0 Severity and Metrics:&lt;/strong&gt;&lt;p data-testid=&#39;vuln-cvssv2-score-container&#39;&gt;&lt;strong&gt;Base Score: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score&#39;&gt;5.0 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score-severity&#39;&gt;MEDIUM&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Vector: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-vector&#39;&gt;(AV:N/AC:L/Au:N/C:N/I:P/A:N)&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Impact Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-impact-subscore&#39;&gt;2.9&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Exploitability Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-exploitability-score&#39;&gt;10.0&lt;/span&gt;&lt;/p&gt;&lt;hr /&gt;&lt;p data-testid=&#39;vuln-cvssv2-metrics-container&#39;&gt;&lt;strong&gt;Access Vector (AV): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-av&#39;&gt;Network&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Access Complexity (AC): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-ac&#39;&gt;Low&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Authentication (AU): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-au&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Confidentiality (C): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Integrity (I): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-i&#39;&gt;Partial&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Availability (A): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-a&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Additional Information: &lt;/strong&gt;&lt;br/&gt;&lt;span data-testid=&#39;vuln-cvssv2-additional&#39;&gt;Allows unauthorized modification&lt;br/&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;"/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnCommentsPanel"
data-testid="vuln-comments-container">
<h3>
Vendor Statements (<a href="/vuln/vendor-comments"
target="_blank" rel="noopener noreferrer">disclaimer</a>)
</h3>
<div class="bs-callout bs-callout-info" data-testid="vuln-comments-row-0">
<h4>Official Statement from Red Hat (03/14/2007)</h4>
<p>Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.</div>
</div>
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
target="_blank" rel="noopener noreferrer">ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
target="_blank" rel="noopener noreferrer">ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-2">
<td data-testid="vuln-hyperlinks-link-2">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-2">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-3">
<td data-testid="vuln-hyperlinks-link-3">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-3">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-4">
<td data-testid="vuln-hyperlinks-link-4">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-4">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-5">
<td data-testid="vuln-hyperlinks-link-5">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-5">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-6">
<td data-testid="vuln-hyperlinks-link-6">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-6">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-7">
<td data-testid="vuln-hyperlinks-link-7">
<a
href="ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
target="_blank" rel="noopener noreferrer">ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U</a></td>
<td data-testid="vuln-hyperlinks-resType-7">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-8">
<td data-testid="vuln-hyperlinks-link-8">
<a
href="http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
target="_blank" rel="noopener noreferrer">http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html</a></td>
<td data-testid="vuln-hyperlinks-resType-8">
<span>
<span class="badge">Patch</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-9">
<td data-testid="vuln-hyperlinks-link-9">
<a
href="http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
target="_blank" rel="noopener noreferrer">http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html</a></td>
<td data-testid="vuln-hyperlinks-resType-9">
<span>
<span class="badge">Patch</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-10">
<td data-testid="vuln-hyperlinks-link-10">
<a
href="http://rhn.redhat.com/errata/RHSA-2006-0177.html"
target="_blank" rel="noopener noreferrer">http://rhn.redhat.com/errata/RHSA-2006-0177.html</a></td>
<td data-testid="vuln-hyperlinks-resType-10">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-11">
<td data-testid="vuln-hyperlinks-link-11">
<a
href="http://rhn.redhat.com/errata/RHSA-2006-0177.html"
target="_blank" rel="noopener noreferrer">http://rhn.redhat.com/errata/RHSA-2006-0177.html</a></td>
<td data-testid="vuln-hyperlinks-resType-11">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-12">
<td data-testid="vuln-hyperlinks-link-12">
<a
href="http://scary.beasts.org/security/CESA-2005-003.txt"
target="_blank" rel="noopener noreferrer">http://scary.beasts.org/security/CESA-2005-003.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-12">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-13">
<td data-testid="vuln-hyperlinks-link-13">
<a
href="http://scary.beasts.org/security/CESA-2005-003.txt"
target="_blank" rel="noopener noreferrer">http://scary.beasts.org/security/CESA-2005-003.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-13">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-14">
<td data-testid="vuln-hyperlinks-link-14">
<a
href="http://secunia.com/advisories/18147"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18147</a></td>
<td data-testid="vuln-hyperlinks-resType-14">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-15">
<td data-testid="vuln-hyperlinks-link-15">
<a
href="http://secunia.com/advisories/18147"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18147</a></td>
<td data-testid="vuln-hyperlinks-resType-15">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-16">
<td data-testid="vuln-hyperlinks-link-16">
<a
href="http://secunia.com/advisories/18303"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18303</a></td>
<td data-testid="vuln-hyperlinks-resType-16">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-17">
<td data-testid="vuln-hyperlinks-link-17">
<a
href="http://secunia.com/advisories/18303"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18303</a></td>
<td data-testid="vuln-hyperlinks-resType-17">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-18">
<td data-testid="vuln-hyperlinks-link-18">
<a
href="http://secunia.com/advisories/18312"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18312</a></td>
<td data-testid="vuln-hyperlinks-resType-18">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-19">
<td data-testid="vuln-hyperlinks-link-19">
<a
href="http://secunia.com/advisories/18312"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18312</a></td>
<td data-testid="vuln-hyperlinks-resType-19">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-20">
<td data-testid="vuln-hyperlinks-link-20">
<a
href="http://secunia.com/advisories/18313"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18313</a></td>
<td data-testid="vuln-hyperlinks-resType-20">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-21">
<td data-testid="vuln-hyperlinks-link-21">
<a
href="http://secunia.com/advisories/18313"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18313</a></td>
<td data-testid="vuln-hyperlinks-resType-21">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-22">
<td data-testid="vuln-hyperlinks-link-22">
<a
href="http://secunia.com/advisories/18329"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18329</a></td>
<td data-testid="vuln-hyperlinks-resType-22">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-23">
<td data-testid="vuln-hyperlinks-link-23">
<a
href="http://secunia.com/advisories/18329"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18329</a></td>
<td data-testid="vuln-hyperlinks-resType-23">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-24">
<td data-testid="vuln-hyperlinks-link-24">
<a
href="http://secunia.com/advisories/18332"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18332</a></td>
<td data-testid="vuln-hyperlinks-resType-24">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-25">
<td data-testid="vuln-hyperlinks-link-25">
<a
href="http://secunia.com/advisories/18332"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18332</a></td>
<td data-testid="vuln-hyperlinks-resType-25">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-26">
<td data-testid="vuln-hyperlinks-link-26">
<a
href="http://secunia.com/advisories/18334"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18334</a></td>
<td data-testid="vuln-hyperlinks-resType-26">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-27">
<td data-testid="vuln-hyperlinks-link-27">
<a
href="http://secunia.com/advisories/18334"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18334</a></td>
<td data-testid="vuln-hyperlinks-resType-27">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-28">
<td data-testid="vuln-hyperlinks-link-28">
<a
href="http://secunia.com/advisories/18338"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18338</a></td>
<td data-testid="vuln-hyperlinks-resType-28">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-29">
<td data-testid="vuln-hyperlinks-link-29">
<a
href="http://secunia.com/advisories/18338"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18338</a></td>
<td data-testid="vuln-hyperlinks-resType-29">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-30">
<td data-testid="vuln-hyperlinks-link-30">
<a
href="http://secunia.com/advisories/18349"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18349</a></td>
<td data-testid="vuln-hyperlinks-resType-30">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-31">
<td data-testid="vuln-hyperlinks-link-31">
<a
href="http://secunia.com/advisories/18349"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18349</a></td>
<td data-testid="vuln-hyperlinks-resType-31">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-32">
<td data-testid="vuln-hyperlinks-link-32">
<a
href="http://secunia.com/advisories/18373"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18373</a></td>
<td data-testid="vuln-hyperlinks-resType-32">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-33">
<td data-testid="vuln-hyperlinks-link-33">
<a
href="http://secunia.com/advisories/18373"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18373</a></td>
<td data-testid="vuln-hyperlinks-resType-33">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-34">
<td data-testid="vuln-hyperlinks-link-34">
<a
href="http://secunia.com/advisories/18375"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18375</a></td>
<td data-testid="vuln-hyperlinks-resType-34">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-35">
<td data-testid="vuln-hyperlinks-link-35">
<a
href="http://secunia.com/advisories/18375"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18375</a></td>
<td data-testid="vuln-hyperlinks-resType-35">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-36">
<td data-testid="vuln-hyperlinks-link-36">
<a
href="http://secunia.com/advisories/18380"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18380</a></td>
<td data-testid="vuln-hyperlinks-resType-36">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-37">
<td data-testid="vuln-hyperlinks-link-37">
<a
href="http://secunia.com/advisories/18380"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18380</a></td>
<td data-testid="vuln-hyperlinks-resType-37">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-38">
<td data-testid="vuln-hyperlinks-link-38">
<a
href="http://secunia.com/advisories/18385"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18385</a></td>
<td data-testid="vuln-hyperlinks-resType-38">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-39">
<td data-testid="vuln-hyperlinks-link-39">
<a
href="http://secunia.com/advisories/18385"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18385</a></td>
<td data-testid="vuln-hyperlinks-resType-39">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-40">
<td data-testid="vuln-hyperlinks-link-40">
<a
href="http://secunia.com/advisories/18387"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18387</a></td>
<td data-testid="vuln-hyperlinks-resType-40">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-41">
<td data-testid="vuln-hyperlinks-link-41">
<a
href="http://secunia.com/advisories/18387"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18387</a></td>
<td data-testid="vuln-hyperlinks-resType-41">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-42">
<td data-testid="vuln-hyperlinks-link-42">
<a
href="http://secunia.com/advisories/18389"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18389</a></td>
<td data-testid="vuln-hyperlinks-resType-42">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-43">
<td data-testid="vuln-hyperlinks-link-43">
<a
href="http://secunia.com/advisories/18389"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18389</a></td>
<td data-testid="vuln-hyperlinks-resType-43">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-44">
<td data-testid="vuln-hyperlinks-link-44">
<a
href="http://secunia.com/advisories/18398"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18398</a></td>
<td data-testid="vuln-hyperlinks-resType-44">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-45">
<td data-testid="vuln-hyperlinks-link-45">
<a
href="http://secunia.com/advisories/18398"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18398</a></td>
<td data-testid="vuln-hyperlinks-resType-45">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-46">
<td data-testid="vuln-hyperlinks-link-46">
<a
href="http://secunia.com/advisories/18407"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18407</a></td>
<td data-testid="vuln-hyperlinks-resType-46">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-47">
<td data-testid="vuln-hyperlinks-link-47">
<a
href="http://secunia.com/advisories/18407"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18407</a></td>
<td data-testid="vuln-hyperlinks-resType-47">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-48">
<td data-testid="vuln-hyperlinks-link-48">
<a
href="http://secunia.com/advisories/18414"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18414</a></td>
<td data-testid="vuln-hyperlinks-resType-48">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-49">
<td data-testid="vuln-hyperlinks-link-49">
<a
href="http://secunia.com/advisories/18414"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18414</a></td>
<td data-testid="vuln-hyperlinks-resType-49">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-50">
<td data-testid="vuln-hyperlinks-link-50">
<a
href="http://secunia.com/advisories/18416"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18416</a></td>
<td data-testid="vuln-hyperlinks-resType-50">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-51">
<td data-testid="vuln-hyperlinks-link-51">
<a
href="http://secunia.com/advisories/18416"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18416</a></td>
<td data-testid="vuln-hyperlinks-resType-51">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-52">
<td data-testid="vuln-hyperlinks-link-52">
<a
href="http://secunia.com/advisories/18423"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18423</a></td>
<td data-testid="vuln-hyperlinks-resType-52">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-53">
<td data-testid="vuln-hyperlinks-link-53">
<a
href="http://secunia.com/advisories/18423"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18423</a></td>
<td data-testid="vuln-hyperlinks-resType-53">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-54">
<td data-testid="vuln-hyperlinks-link-54">
<a
href="http://secunia.com/advisories/18425"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18425</a></td>
<td data-testid="vuln-hyperlinks-resType-54">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-55">
<td data-testid="vuln-hyperlinks-link-55">
<a
href="http://secunia.com/advisories/18425"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18425</a></td>
<td data-testid="vuln-hyperlinks-resType-55">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-56">
<td data-testid="vuln-hyperlinks-link-56">
<a
href="http://secunia.com/advisories/18428"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18428</a></td>
<td data-testid="vuln-hyperlinks-resType-56">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-57">
<td data-testid="vuln-hyperlinks-link-57">
<a
href="http://secunia.com/advisories/18428"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18428</a></td>
<td data-testid="vuln-hyperlinks-resType-57">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-58">
<td data-testid="vuln-hyperlinks-link-58">
<a
href="http://secunia.com/advisories/18436"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18436</a></td>
<td data-testid="vuln-hyperlinks-resType-58">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-59">
<td data-testid="vuln-hyperlinks-link-59">
<a
href="http://secunia.com/advisories/18436"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18436</a></td>
<td data-testid="vuln-hyperlinks-resType-59">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-60">
<td data-testid="vuln-hyperlinks-link-60">
<a
href="http://secunia.com/advisories/18448"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18448</a></td>
<td data-testid="vuln-hyperlinks-resType-60">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-61">
<td data-testid="vuln-hyperlinks-link-61">
<a
href="http://secunia.com/advisories/18448"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18448</a></td>
<td data-testid="vuln-hyperlinks-resType-61">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-62">
<td data-testid="vuln-hyperlinks-link-62">
<a
href="http://secunia.com/advisories/18463"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18463</a></td>
<td data-testid="vuln-hyperlinks-resType-62">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-63">
<td data-testid="vuln-hyperlinks-link-63">
<a
href="http://secunia.com/advisories/18463"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18463</a></td>
<td data-testid="vuln-hyperlinks-resType-63">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-64">
<td data-testid="vuln-hyperlinks-link-64">
<a
href="http://secunia.com/advisories/18517"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18517</a></td>
<td data-testid="vuln-hyperlinks-resType-64">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-65">
<td data-testid="vuln-hyperlinks-link-65">
<a
href="http://secunia.com/advisories/18517"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18517</a></td>
<td data-testid="vuln-hyperlinks-resType-65">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-66">
<td data-testid="vuln-hyperlinks-link-66">
<a
href="http://secunia.com/advisories/18534"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18534</a></td>
<td data-testid="vuln-hyperlinks-resType-66">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-67">
<td data-testid="vuln-hyperlinks-link-67">
<a
href="http://secunia.com/advisories/18534"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18534</a></td>
<td data-testid="vuln-hyperlinks-resType-67">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-68">
<td data-testid="vuln-hyperlinks-link-68">
<a
href="http://secunia.com/advisories/18554"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18554</a></td>
<td data-testid="vuln-hyperlinks-resType-68">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-69">
<td data-testid="vuln-hyperlinks-link-69">
<a
href="http://secunia.com/advisories/18554"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18554</a></td>
<td data-testid="vuln-hyperlinks-resType-69">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-70">
<td data-testid="vuln-hyperlinks-link-70">
<a
href="http://secunia.com/advisories/18582"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18582</a></td>
<td data-testid="vuln-hyperlinks-resType-70">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-71">
<td data-testid="vuln-hyperlinks-link-71">
<a
href="http://secunia.com/advisories/18582"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18582</a></td>
<td data-testid="vuln-hyperlinks-resType-71">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-72">
<td data-testid="vuln-hyperlinks-link-72">
<a
href="http://secunia.com/advisories/18642"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18642</a></td>
<td data-testid="vuln-hyperlinks-resType-72">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-73">
<td data-testid="vuln-hyperlinks-link-73">
<a
href="http://secunia.com/advisories/18642"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18642</a></td>
<td data-testid="vuln-hyperlinks-resType-73">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-74">
<td data-testid="vuln-hyperlinks-link-74">
<a
href="http://secunia.com/advisories/18644"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18644</a></td>
<td data-testid="vuln-hyperlinks-resType-74">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-75">
<td data-testid="vuln-hyperlinks-link-75">
<a
href="http://secunia.com/advisories/18644"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18644</a></td>
<td data-testid="vuln-hyperlinks-resType-75">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-76">
<td data-testid="vuln-hyperlinks-link-76">
<a
href="http://secunia.com/advisories/18674"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18674</a></td>
<td data-testid="vuln-hyperlinks-resType-76">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-77">
<td data-testid="vuln-hyperlinks-link-77">
<a
href="http://secunia.com/advisories/18674"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18674</a></td>
<td data-testid="vuln-hyperlinks-resType-77">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-78">
<td data-testid="vuln-hyperlinks-link-78">
<a
href="http://secunia.com/advisories/18675"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18675</a></td>
<td data-testid="vuln-hyperlinks-resType-78">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-79">
<td data-testid="vuln-hyperlinks-link-79">
<a
href="http://secunia.com/advisories/18675"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18675</a></td>
<td data-testid="vuln-hyperlinks-resType-79">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-80">
<td data-testid="vuln-hyperlinks-link-80">
<a
href="http://secunia.com/advisories/18679"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18679</a></td>
<td data-testid="vuln-hyperlinks-resType-80">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-81">
<td data-testid="vuln-hyperlinks-link-81">
<a
href="http://secunia.com/advisories/18679"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18679</a></td>
<td data-testid="vuln-hyperlinks-resType-81">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-82">
<td data-testid="vuln-hyperlinks-link-82">
<a
href="http://secunia.com/advisories/18908"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18908</a></td>
<td data-testid="vuln-hyperlinks-resType-82">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-83">
<td data-testid="vuln-hyperlinks-link-83">
<a
href="http://secunia.com/advisories/18908"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18908</a></td>
<td data-testid="vuln-hyperlinks-resType-83">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-84">
<td data-testid="vuln-hyperlinks-link-84">
<a
href="http://secunia.com/advisories/18913"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18913</a></td>
<td data-testid="vuln-hyperlinks-resType-84">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-85">
<td data-testid="vuln-hyperlinks-link-85">
<a
href="http://secunia.com/advisories/18913"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/18913</a></td>
<td data-testid="vuln-hyperlinks-resType-85">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-86">
<td data-testid="vuln-hyperlinks-link-86">
<a
href="http://secunia.com/advisories/19230"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/19230</a></td>
<td data-testid="vuln-hyperlinks-resType-86">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-87">
<td data-testid="vuln-hyperlinks-link-87">
<a
href="http://secunia.com/advisories/19230"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/19230</a></td>
<td data-testid="vuln-hyperlinks-resType-87">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-88">
<td data-testid="vuln-hyperlinks-link-88">
<a
href="http://secunia.com/advisories/19377"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/19377</a></td>
<td data-testid="vuln-hyperlinks-resType-88">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-89">
<td data-testid="vuln-hyperlinks-link-89">
<a
href="http://secunia.com/advisories/19377"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/19377</a></td>
<td data-testid="vuln-hyperlinks-resType-89">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-90">
<td data-testid="vuln-hyperlinks-link-90">
<a
href="http://secunia.com/advisories/25729"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/25729</a></td>
<td data-testid="vuln-hyperlinks-resType-90">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-91">
<td data-testid="vuln-hyperlinks-link-91">
<a
href="http://secunia.com/advisories/25729"
target="_blank" rel="noopener noreferrer">http://secunia.com/advisories/25729</a></td>
<td data-testid="vuln-hyperlinks-resType-91">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-92">
<td data-testid="vuln-hyperlinks-link-92">
<a
href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.472683"
target="_blank" rel="noopener noreferrer">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.472683</a></td>
<td data-testid="vuln-hyperlinks-resType-92">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-93">
<td data-testid="vuln-hyperlinks-link-93">
<a
href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.472683"
target="_blank" rel="noopener noreferrer">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.472683</a></td>
<td data-testid="vuln-hyperlinks-resType-93">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-94">
<td data-testid="vuln-hyperlinks-link-94">
<a
href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.474747"
target="_blank" rel="noopener noreferrer">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.474747</a></td>
<td data-testid="vuln-hyperlinks-resType-94">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-95">
<td data-testid="vuln-hyperlinks-link-95">
<a
href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.474747"
target="_blank" rel="noopener noreferrer">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.474747</a></td>
<td data-testid="vuln-hyperlinks-resType-95">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-96">
<td data-testid="vuln-hyperlinks-link-96">
<a
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
target="_blank" rel="noopener noreferrer">http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1</a></td>
<td data-testid="vuln-hyperlinks-resType-96">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-97">
<td data-testid="vuln-hyperlinks-link-97">
<a
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
target="_blank" rel="noopener noreferrer">http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1</a></td>
<td data-testid="vuln-hyperlinks-resType-97">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-98">
<td data-testid="vuln-hyperlinks-link-98">
<a
href="http://www.debian.org/security/2005/dsa-931"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-931</a></td>
<td data-testid="vuln-hyperlinks-resType-98">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-99">
<td data-testid="vuln-hyperlinks-link-99">
<a
href="http://www.debian.org/security/2005/dsa-931"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-931</a></td>
<td data-testid="vuln-hyperlinks-resType-99">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-100">
<td data-testid="vuln-hyperlinks-link-100">
<a
href="http://www.debian.org/security/2005/dsa-932"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-932</a></td>
<td data-testid="vuln-hyperlinks-resType-100">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-101">
<td data-testid="vuln-hyperlinks-link-101">
<a
href="http://www.debian.org/security/2005/dsa-932"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-932</a></td>
<td data-testid="vuln-hyperlinks-resType-101">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-102">
<td data-testid="vuln-hyperlinks-link-102">
<a
href="http://www.debian.org/security/2005/dsa-937"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-937</a></td>
<td data-testid="vuln-hyperlinks-resType-102">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-103">
<td data-testid="vuln-hyperlinks-link-103">
<a
href="http://www.debian.org/security/2005/dsa-937"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-937</a></td>
<td data-testid="vuln-hyperlinks-resType-103">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-104">
<td data-testid="vuln-hyperlinks-link-104">
<a
href="http://www.debian.org/security/2005/dsa-938"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-938</a></td>
<td data-testid="vuln-hyperlinks-resType-104">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-105">
<td data-testid="vuln-hyperlinks-link-105">
<a
href="http://www.debian.org/security/2005/dsa-938"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-938</a></td>
<td data-testid="vuln-hyperlinks-resType-105">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-106">
<td data-testid="vuln-hyperlinks-link-106">
<a
href="http://www.debian.org/security/2005/dsa-940"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-940</a></td>
<td data-testid="vuln-hyperlinks-resType-106">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-107">
<td data-testid="vuln-hyperlinks-link-107">
<a
href="http://www.debian.org/security/2005/dsa-940"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2005/dsa-940</a></td>
<td data-testid="vuln-hyperlinks-resType-107">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-108">
<td data-testid="vuln-hyperlinks-link-108">
<a
href="http://www.debian.org/security/2006/dsa-936"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-936</a></td>
<td data-testid="vuln-hyperlinks-resType-108">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-109">
<td data-testid="vuln-hyperlinks-link-109">
<a
href="http://www.debian.org/security/2006/dsa-936"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-936</a></td>
<td data-testid="vuln-hyperlinks-resType-109">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-110">
<td data-testid="vuln-hyperlinks-link-110">
<a
href="http://www.debian.org/security/2006/dsa-950"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-950</a></td>
<td data-testid="vuln-hyperlinks-resType-110">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-111">
<td data-testid="vuln-hyperlinks-link-111">
<a
href="http://www.debian.org/security/2006/dsa-950"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-950</a></td>
<td data-testid="vuln-hyperlinks-resType-111">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-112">
<td data-testid="vuln-hyperlinks-link-112">
<a
href="http://www.debian.org/security/2006/dsa-961"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-961</a></td>
<td data-testid="vuln-hyperlinks-resType-112">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-113">
<td data-testid="vuln-hyperlinks-link-113">
<a
href="http://www.debian.org/security/2006/dsa-961"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-961</a></td>
<td data-testid="vuln-hyperlinks-resType-113">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-114">
<td data-testid="vuln-hyperlinks-link-114">
<a
href="http://www.debian.org/security/2006/dsa-962"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-962</a></td>
<td data-testid="vuln-hyperlinks-resType-114">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-115">
<td data-testid="vuln-hyperlinks-link-115">
<a
href="http://www.debian.org/security/2006/dsa-962"
target="_blank" rel="noopener noreferrer">http://www.debian.org/security/2006/dsa-962</a></td>
<td data-testid="vuln-hyperlinks-resType-115">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-116">
<td data-testid="vuln-hyperlinks-link-116">
<a
href="http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
target="_blank" rel="noopener noreferrer">http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml</a></td>
<td data-testid="vuln-hyperlinks-resType-116">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-117">
<td data-testid="vuln-hyperlinks-link-117">
<a
href="http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
target="_blank" rel="noopener noreferrer">http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml</a></td>
<td data-testid="vuln-hyperlinks-resType-117">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-118">
<td data-testid="vuln-hyperlinks-link-118">
<a
href="http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"
target="_blank" rel="noopener noreferrer">http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml</a></td>
<td data-testid="vuln-hyperlinks-resType-118">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-119">
<td data-testid="vuln-hyperlinks-link-119">
<a
href="http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"
target="_blank" rel="noopener noreferrer">http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml</a></td>
<td data-testid="vuln-hyperlinks-resType-119">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-120">
<td data-testid="vuln-hyperlinks-link-120">
<a
href="http://www.kde.org/info/security/advisory-20051207-2.txt"
target="_blank" rel="noopener noreferrer">http://www.kde.org/info/security/advisory-20051207-2.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-120">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-121">
<td data-testid="vuln-hyperlinks-link-121">
<a
href="http://www.kde.org/info/security/advisory-20051207-2.txt"
target="_blank" rel="noopener noreferrer">http://www.kde.org/info/security/advisory-20051207-2.txt</a></td>
<td data-testid="vuln-hyperlinks-resType-121">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-122">
<td data-testid="vuln-hyperlinks-link-122">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:003</a></td>
<td data-testid="vuln-hyperlinks-resType-122">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-123">
<td data-testid="vuln-hyperlinks-link-123">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:003</a></td>
<td data-testid="vuln-hyperlinks-resType-123">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-124">
<td data-testid="vuln-hyperlinks-link-124">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:004</a></td>
<td data-testid="vuln-hyperlinks-resType-124">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-125">
<td data-testid="vuln-hyperlinks-link-125">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:004</a></td>
<td data-testid="vuln-hyperlinks-resType-125">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-126">
<td data-testid="vuln-hyperlinks-link-126">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:005</a></td>
<td data-testid="vuln-hyperlinks-resType-126">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-127">
<td data-testid="vuln-hyperlinks-link-127">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:005</a></td>
<td data-testid="vuln-hyperlinks-resType-127">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-128">
<td data-testid="vuln-hyperlinks-link-128">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:006</a></td>
<td data-testid="vuln-hyperlinks-resType-128">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-129">
<td data-testid="vuln-hyperlinks-link-129">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:006</a></td>
<td data-testid="vuln-hyperlinks-resType-129">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-130">
<td data-testid="vuln-hyperlinks-link-130">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:008</a></td>
<td data-testid="vuln-hyperlinks-resType-130">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-131">
<td data-testid="vuln-hyperlinks-link-131">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:008</a></td>
<td data-testid="vuln-hyperlinks-resType-131">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-132">
<td data-testid="vuln-hyperlinks-link-132">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:010</a></td>
<td data-testid="vuln-hyperlinks-resType-132">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-133">
<td data-testid="vuln-hyperlinks-link-133">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:010</a></td>
<td data-testid="vuln-hyperlinks-resType-133">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-134">
<td data-testid="vuln-hyperlinks-link-134">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:011</a></td>
<td data-testid="vuln-hyperlinks-resType-134">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-135">
<td data-testid="vuln-hyperlinks-link-135">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:011</a></td>
<td data-testid="vuln-hyperlinks-resType-135">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-136">
<td data-testid="vuln-hyperlinks-link-136">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:012</a></td>
<td data-testid="vuln-hyperlinks-resType-136">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-137">
<td data-testid="vuln-hyperlinks-link-137">
<a
href="http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDKSA-2006:012</a></td>
<td data-testid="vuln-hyperlinks-resType-137">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-138">
<td data-testid="vuln-hyperlinks-link-138">
<a
href="http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html</a></td>
<td data-testid="vuln-hyperlinks-resType-138">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-139">
<td data-testid="vuln-hyperlinks-link-139">
<a
href="http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html</a></td>
<td data-testid="vuln-hyperlinks-resType-139">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-140">
<td data-testid="vuln-hyperlinks-link-140">
<a
href="http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html</a></td>
<td data-testid="vuln-hyperlinks-resType-140">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-141">
<td data-testid="vuln-hyperlinks-link-141">
<a
href="http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html</a></td>
<td data-testid="vuln-hyperlinks-resType-141">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-142">
<td data-testid="vuln-hyperlinks-link-142">
<a
href="http://www.redhat.com/support/errata/RHSA-2006-0160.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2006-0160.html</a></td>
<td data-testid="vuln-hyperlinks-resType-142">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-143">
<td data-testid="vuln-hyperlinks-link-143">
<a
href="http://www.redhat.com/support/errata/RHSA-2006-0160.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2006-0160.html</a></td>
<td data-testid="vuln-hyperlinks-resType-143">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-144">
<td data-testid="vuln-hyperlinks-link-144">
<a
href="http://www.redhat.com/support/errata/RHSA-2006-0163.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2006-0163.html</a></td>
<td data-testid="vuln-hyperlinks-resType-144">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-145">
<td data-testid="vuln-hyperlinks-link-145">
<a
href="http://www.redhat.com/support/errata/RHSA-2006-0163.html"
target="_blank" rel="noopener noreferrer">http://www.redhat.com/support/errata/RHSA-2006-0163.html</a></td>
<td data-testid="vuln-hyperlinks-resType-145">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-146">
<td data-testid="vuln-hyperlinks-link-146">
<a
href="http://www.securityfocus.com/archive/1/427053/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/427053/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-146">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-147">
<td data-testid="vuln-hyperlinks-link-147">
<a
href="http://www.securityfocus.com/archive/1/427053/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/427053/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-147">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-148">
<td data-testid="vuln-hyperlinks-link-148">
<a
href="http://www.securityfocus.com/archive/1/427990/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/427990/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-148">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-149">
<td data-testid="vuln-hyperlinks-link-149">
<a
href="http://www.securityfocus.com/archive/1/427990/100/0/threaded"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/archive/1/427990/100/0/threaded</a></td>
<td data-testid="vuln-hyperlinks-resType-149">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-150">
<td data-testid="vuln-hyperlinks-link-150">
<a
href="http://www.securityfocus.com/bid/16143"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/16143</a></td>
<td data-testid="vuln-hyperlinks-resType-150">
<span>
<span class="badge">Patch</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-151">
<td data-testid="vuln-hyperlinks-link-151">
<a
href="http://www.securityfocus.com/bid/16143"
target="_blank" rel="noopener noreferrer">http://www.securityfocus.com/bid/16143</a></td>
<td data-testid="vuln-hyperlinks-resType-151">
<span>
<span class="badge">Patch</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-152">
<td data-testid="vuln-hyperlinks-link-152">
<a
href="http://www.trustix.org/errata/2006/0002/"
target="_blank" rel="noopener noreferrer">http://www.trustix.org/errata/2006/0002/</a></td>
<td data-testid="vuln-hyperlinks-resType-152">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-153">
<td data-testid="vuln-hyperlinks-link-153">
<a
href="http://www.trustix.org/errata/2006/0002/"
target="_blank" rel="noopener noreferrer">http://www.trustix.org/errata/2006/0002/</a></td>
<td data-testid="vuln-hyperlinks-resType-153">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-154">
<td data-testid="vuln-hyperlinks-link-154">
<a
href="http://www.vupen.com/english/advisories/2006/0047"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2006/0047</a></td>
<td data-testid="vuln-hyperlinks-resType-154">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-155">
<td data-testid="vuln-hyperlinks-link-155">
<a
href="http://www.vupen.com/english/advisories/2006/0047"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2006/0047</a></td>
<td data-testid="vuln-hyperlinks-resType-155">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-156">
<td data-testid="vuln-hyperlinks-link-156">
<a
href="http://www.vupen.com/english/advisories/2007/2280"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2007/2280</a></td>
<td data-testid="vuln-hyperlinks-resType-156">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-157">
<td data-testid="vuln-hyperlinks-link-157">
<a
href="http://www.vupen.com/english/advisories/2007/2280"
target="_blank" rel="noopener noreferrer">http://www.vupen.com/english/advisories/2007/2280</a></td>
<td data-testid="vuln-hyperlinks-resType-157">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-158">
<td data-testid="vuln-hyperlinks-link-158">
<a
href="https://exchange.xforce.ibmcloud.com/vulnerabilities/24022"
target="_blank" rel="noopener noreferrer">https://exchange.xforce.ibmcloud.com/vulnerabilities/24022</a></td>
<td data-testid="vuln-hyperlinks-resType-158">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-159">
<td data-testid="vuln-hyperlinks-link-159">
<a
href="https://exchange.xforce.ibmcloud.com/vulnerabilities/24022"
target="_blank" rel="noopener noreferrer">https://exchange.xforce.ibmcloud.com/vulnerabilities/24022</a></td>
<td data-testid="vuln-hyperlinks-resType-159">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-160">
<td data-testid="vuln-hyperlinks-link-160">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437</a></td>
<td data-testid="vuln-hyperlinks-resType-160">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-161">
<td data-testid="vuln-hyperlinks-link-161">
<a
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437"
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437</a></td>
<td data-testid="vuln-hyperlinks-resType-161">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-162">
<td data-testid="vuln-hyperlinks-link-162">
<a
href="https://usn.ubuntu.com/236-1/"
target="_blank" rel="noopener noreferrer">https://usn.ubuntu.com/236-1/</a></td>
<td data-testid="vuln-hyperlinks-resType-162">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-163">
<td data-testid="vuln-hyperlinks-link-163">
<a
href="https://usn.ubuntu.com/236-1/"
target="_blank" rel="noopener noreferrer">https://usn.ubuntu.com/236-1/</a></td>
<td data-testid="vuln-hyperlinks-resType-163">
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<a href="http://cwe.mitre.org/data/definitions/189.html" target="_blank" rel="noopener noreferrer">CWE-189</a>
</td>
<td
data-testid="vuln-CWEs-link-0">Numeric Errors</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cweNvdIcon"
alt="cwe source acceptance level">
<span>NIST</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2005-3624"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:22,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aeasy_software_products%3Acups%3A1.1.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:easy_software_products:cups:1.1.22&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0&quot;,&quot;id&quot;:&quot;13534778&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aeasy_software_products%3Acups%3A1.1.22_rc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:easy_software_products:cups:1.1.22_rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1&quot;,&quot;id&quot;:&quot;13534791&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aeasy_software_products%3Acups%3A1.1.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:easy_software_products:cups:1.1.23&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-2&quot;,&quot;id&quot;:&quot;13534797&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aeasy_software_products%3Acups%3A1.1.23_rc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:easy_software_products:cups:1.1.23_rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-3&quot;,&quot;id&quot;:&quot;13534787&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akdegraphics%3A3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:kdegraphics:3.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-4&quot;,&quot;id&quot;:&quot;13534788&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akdegraphics%3A3.4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:kdegraphics:3.4.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-5&quot;,&quot;id&quot;:&quot;13534780&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akoffice%3A1.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:koffice:1.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-6&quot;,&quot;id&quot;:&quot;13534798&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akoffice%3A1.4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:koffice:1.4.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-7&quot;,&quot;id&quot;:&quot;13534782&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akoffice%3A1.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:koffice:1.4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-8&quot;,&quot;id&quot;:&quot;13534789&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akpdf%3A3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:kpdf:3.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-9&quot;,&quot;id&quot;:&quot;13534796&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akpdf%3A3.4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:kpdf:3.4.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-10&quot;,&quot;id&quot;:&quot;13534779&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Akde%3Akword%3A1.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:kde:kword:1.4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-11&quot;,&quot;id&quot;:&quot;13534783&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Alibextractor%3Alibextractor%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:libextractor:libextractor&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-12&quot;,&quot;id&quot;:&quot;13534790&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Apoppler%3Apoppler%3A0.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:poppler:poppler:0.4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-13&quot;,&quot;id&quot;:&quot;13534784&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asgi%3Apropack%3A3.0%3Asp6%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:sgi:propack:3.0:sp6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-14&quot;,&quot;id&quot;:&quot;13534786&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Atetex%3Atetex%3A1.0.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:tetex:tetex:1.0.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-15&quot;,&quot;id&quot;:&quot;13534785&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Atetex%3Atetex%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:tetex:tetex:2.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-16&quot;,&quot;id&quot;:&quot;13534799&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Atetex%3Atetex%3A2.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:tetex:tetex:2.0.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-17&quot;,&quot;id&quot;:&quot;13534794&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Atetex%3Atetex%3A2.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:tetex:tetex:2.0.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-18&quot;,&quot;id&quot;:&quot;13534793&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Atetex%3Atetex%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:tetex:tetex:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-19&quot;,&quot;id&quot;:&quot;13534781&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Axpdf%3Axpdf%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:xpdf:xpdf:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-20&quot;,&quot;id&quot;:&quot;13534792&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aconectiva%3Alinux%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:conectiva:linux:10.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-21&quot;,&quot;id&quot;:&quot;13534795&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-config-2&quot;,&quot;totalCpeCount&quot;:105,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0&quot;,&quot;id&quot;:&quot;13534898&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Aalpha%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::alpha&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-1&quot;,&quot;id&quot;:&quot;13534897&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Aarm%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::arm&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-2&quot;,&quot;id&quot;:&quot;13534815&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Ahppa%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::hppa&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-3&quot;,&quot;id&quot;:&quot;13534860&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Aia-32%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::ia-32&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-4&quot;,&quot;id&quot;:&quot;13534829&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Aia-64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::ia-64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-5&quot;,&quot;id&quot;:&quot;13534870&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Am68k%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::m68k&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-6&quot;,&quot;id&quot;:&quot;13534822&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Amips%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::mips&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-7&quot;,&quot;id&quot;:&quot;13534833&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Amipsel%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::mipsel&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-8&quot;,&quot;id&quot;:&quot;13534846&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Appc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::ppc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-9&quot;,&quot;id&quot;:&quot;13534852&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3As-390%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::s-390&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-10&quot;,&quot;id&quot;:&quot;13534875&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.0%3A*%3Asparc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.0::sparc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-11&quot;,&quot;id&quot;:&quot;13534848&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-12&quot;,&quot;id&quot;:&quot;13534834&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Aalpha%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::alpha&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-13&quot;,&quot;id&quot;:&quot;13534864&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Aamd64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::amd64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-14&quot;,&quot;id&quot;:&quot;13534899&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Aarm%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::arm&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-15&quot;,&quot;id&quot;:&quot;13534835&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Ahppa%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::hppa&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-16&quot;,&quot;id&quot;:&quot;13534821&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Aia-32%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::ia-32&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-17&quot;,&quot;id&quot;:&quot;13534888&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Aia-64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::ia-64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-18&quot;,&quot;id&quot;:&quot;13534818&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Am68k%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::m68k&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-19&quot;,&quot;id&quot;:&quot;13534874&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Amips%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::mips&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-20&quot;,&quot;id&quot;:&quot;13534804&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Amipsel%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::mipsel&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-21&quot;,&quot;id&quot;:&quot;13534840&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Appc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::ppc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-22&quot;,&quot;id&quot;:&quot;13534866&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3As-390%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::s-390&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-23&quot;,&quot;id&quot;:&quot;13534844&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A3.1%3A*%3Asparc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:3.1::sparc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-24&quot;,&quot;id&quot;:&quot;13534823&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Agentoo%3Alinux%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:gentoo:linux&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-25&quot;,&quot;id&quot;:&quot;13534892&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A10.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:10.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-26&quot;,&quot;id&quot;:&quot;13534903&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A10.1%3A*%3Ax86-64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-27&quot;,&quot;id&quot;:&quot;13534847&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A10.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:10.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-28&quot;,&quot;id&quot;:&quot;13534817&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A10.2%3A*%3Ax86-64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:10.2::x86-64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-29&quot;,&quot;id&quot;:&quot;13534895&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A2006%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:2006&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-30&quot;,&quot;id&quot;:&quot;13534802&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux%3A2006%3A*%3Ax86-64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-31&quot;,&quot;id&quot;:&quot;13534902&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux_corporate_server%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-32&quot;,&quot;id&quot;:&quot;13534812&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux_corporate_server%3A2.1%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-33&quot;,&quot;id&quot;:&quot;13534901&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux_corporate_server%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-34&quot;,&quot;id&quot;:&quot;13534856&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Amandrakesoft%3Amandrake_linux_corporate_server%3A3.0%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-35&quot;,&quot;id&quot;:&quot;13534862&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aadvanced_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::advanced_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-36&quot;,&quot;id&quot;:&quot;13534838&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aadvanced_server_ia64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::advanced_server_ia64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-37&quot;,&quot;id&quot;:&quot;13534803&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aenterprise_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::enterprise_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-38&quot;,&quot;id&quot;:&quot;13534827&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aenterprise_server_ia64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::enterprise_server_ia64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-39&quot;,&quot;id&quot;:&quot;13534900&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aworkstation%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::workstation&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-40&quot;,&quot;id&quot;:&quot;13534873&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A2.1%3A*%3Aworkstation_ia64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:2.1::workstation_ia64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-41&quot;,&quot;id&quot;:&quot;13534880&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A3.0%3A*%3Aadvanced_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:3.0::advanced_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-42&quot;,&quot;id&quot;:&quot;13534904&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A3.0%3A*%3Aenterprise_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:3.0::enterprise_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-43&quot;,&quot;id&quot;:&quot;13534868&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A3.0%3A*%3Aworkstation_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:3.0::workstation_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-44&quot;,&quot;id&quot;:&quot;13534826&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A4.0%3A*%3Aadvanced_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:4.0::advanced_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-45&quot;,&quot;id&quot;:&quot;13534808&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A4.0%3A*%3Aenterprise_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:4.0::enterprise_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-46&quot;,&quot;id&quot;:&quot;13534865&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A4.0%3A*%3Aworkstation%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux:4.0::workstation&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-47&quot;,&quot;id&quot;:&quot;13534824&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_desktop%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux_desktop:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-48&quot;,&quot;id&quot;:&quot;13534813&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_desktop%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:enterprise_linux_desktop:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-49&quot;,&quot;id&quot;:&quot;13534881&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Afedora_core%3Acore_1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:fedora_core:core_1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-50&quot;,&quot;id&quot;:&quot;13534842&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Afedora_core%3Acore_2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:fedora_core:core_2.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-51&quot;,&quot;id&quot;:&quot;13534806&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Afedora_core%3Acore_3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:fedora_core:core_3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-52&quot;,&quot;id&quot;:&quot;13534886&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Afedora_core%3Acore_4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:fedora_core:core_4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-53&quot;,&quot;id&quot;:&quot;13534857&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Alinux%3A7.3%3A*%3Ai386%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:linux:7.3::i386&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-54&quot;,&quot;id&quot;:&quot;13534878&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Alinux%3A9.0%3A*%3Ai386%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:linux:9.0::i386&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-55&quot;,&quot;id&quot;:&quot;13534853&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Alinux_advanced_workstation%3A2.1%3A*%3Aia64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:linux_advanced_workstation:2.1::ia64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-56&quot;,&quot;id&quot;:&quot;13534820&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aredhat%3Alinux_advanced_workstation%3A2.1%3A*%3Aitanium%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:redhat:linux_advanced_workstation:2.1::itanium&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-57&quot;,&quot;id&quot;:&quot;13534831&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asco%3Aopenserver%3A5.0.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:sco:openserver:5.0.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-58&quot;,&quot;id&quot;:&quot;13534851&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asco%3Aopenserver%3A6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:sco:openserver:6.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-59&quot;,&quot;id&quot;:&quot;13534879&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aslackware%3Aslackware_linux%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:slackware:slackware_linux:9.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-60&quot;,&quot;id&quot;:&quot;13534801&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aslackware%3Aslackware_linux%3A9.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:slackware:slackware_linux:9.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-61&quot;,&quot;id&quot;:&quot;13534837&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aslackware%3Aslackware_linux%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:slackware:slackware_linux:10.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-62&quot;,&quot;id&quot;:&quot;13534809&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aslackware%3Aslackware_linux%3A10.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:slackware:slackware_linux:10.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-63&quot;,&quot;id&quot;:&quot;13534836&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aslackware%3Aslackware_linux%3A10.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:slackware:slackware_linux:10.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-64&quot;,&quot;id&quot;:&quot;13534810&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-65&quot;,&quot;id&quot;:&quot;13534861&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.0%3A*%3Aenterprise_server%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.0::enterprise_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-66&quot;,&quot;id&quot;:&quot;13534800&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.0%3A*%3Apersonal%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.0::personal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-67&quot;,&quot;id&quot;:&quot;13534814&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.0%3A*%3Aprofessional%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.0::professional&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-68&quot;,&quot;id&quot;:&quot;13534871&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.0%3A*%3As_390%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.0::s_390&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-69&quot;,&quot;id&quot;:&quot;13534805&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.0%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.0::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-70&quot;,&quot;id&quot;:&quot;13534839&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.1%3A*%3Apersonal%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.1::personal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-71&quot;,&quot;id&quot;:&quot;13534894&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.1%3A*%3Aprofessional%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.1::professional&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-72&quot;,&quot;id&quot;:&quot;13534872&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.1%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.1::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-73&quot;,&quot;id&quot;:&quot;13534816&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.2%3A*%3Apersonal%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.2::personal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-74&quot;,&quot;id&quot;:&quot;13534890&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.2%3A*%3Aprofessional%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.2::professional&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-75&quot;,&quot;id&quot;:&quot;13534855&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.2%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.2::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-76&quot;,&quot;id&quot;:&quot;13534889&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.3%3A*%3Apersonal%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.3::personal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-77&quot;,&quot;id&quot;:&quot;13534828&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.3%3A*%3Aprofessional%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.3::professional&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-78&quot;,&quot;id&quot;:&quot;13534885&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A9.3%3A*%3Ax86_64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:9.3::x86_64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-79&quot;,&quot;id&quot;:&quot;13534832&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A10.0%3A*%3Aoss%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:10.0::oss&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-80&quot;,&quot;id&quot;:&quot;13534825&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asuse%3Asuse_linux%3A10.0%3A*%3Aprofessional%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:suse:suse_linux:10.0::professional&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-81&quot;,&quot;id&quot;:&quot;13534859&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Atrustix%3Asecure_linux%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:trustix:secure_linux:2.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-82&quot;,&quot;id&quot;:&quot;13534811&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Atrustix%3Asecure_linux%3A2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:trustix:secure_linux:2.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-83&quot;,&quot;id&quot;:&quot;13534883&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Atrustix%3Asecure_linux%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:trustix:secure_linux:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-84&quot;,&quot;id&quot;:&quot;13534841&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux%3A10%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux:10&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-85&quot;,&quot;id&quot;:&quot;13534877&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux%3Afuji%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux:fuji&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-86&quot;,&quot;id&quot;:&quot;13534869&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_appliance_server%3A1.0_hosting_edition%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-87&quot;,&quot;id&quot;:&quot;13534896&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_appliance_server%3A1.0_workgroup_edition%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-88&quot;,&quot;id&quot;:&quot;13534830&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_desktop%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_desktop:10.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-89&quot;,&quot;id&quot;:&quot;13534893&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_home%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_home&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-90&quot;,&quot;id&quot;:&quot;13534863&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_multimedia%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_multimedia&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-91&quot;,&quot;id&quot;:&quot;13534807&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_personal%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_personal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-92&quot;,&quot;id&quot;:&quot;13534876&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_server%3A8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_server:8.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-93&quot;,&quot;id&quot;:&quot;13534884&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_server%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_server:10.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-94&quot;,&quot;id&quot;:&quot;13534891&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_server%3A10.0_x86%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_server:10.0_x86&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-95&quot;,&quot;id&quot;:&quot;13534858&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aturbolinux%3Aturbolinux_workstation%3A8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:turbolinux:turbolinux_workstation:8.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-96&quot;,&quot;id&quot;:&quot;13534867&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A4.1%3A*%3Aia64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:4.1::ia64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-97&quot;,&quot;id&quot;:&quot;13534887&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A4.1%3A*%3Appc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:4.1::ppc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-98&quot;,&quot;id&quot;:&quot;13534819&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.04%3A*%3Aamd64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.04::amd64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-99&quot;,&quot;id&quot;:&quot;13534849&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.04%3A*%3Ai386%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.04::i386&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-100&quot;,&quot;id&quot;:&quot;13534882&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.04%3A*%3Apowerpc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.04::powerpc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-101&quot;,&quot;id&quot;:&quot;13534843&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.10%3A*%3Aamd64%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.10::amd64&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-102&quot;,&quot;id&quot;:&quot;13534850&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.10%3A*%3Ai386%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.10::i386&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-103&quot;,&quot;id&quot;:&quot;13534854&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aubuntu%3Aubuntu_linux%3A5.10%3A*%3Apowerpc%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:ubuntu:ubuntu_linux:5.10::powerpc&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-104&quot;,&quot;id&quot;:&quot;13534845&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 9 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-0">11/20/2024 7:02:16 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://rhn.redhat.com/errata/RHSA-2006-0177.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://scary.beasts.org/security/CESA-2005-003.txt</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18147</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18303</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18312</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18313</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18329</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18332</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18334</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18338</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18349</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18373</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18375</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18380</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18385</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18387</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18389</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18398</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18407</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18414</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18416</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18423</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18425</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18428</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18436</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18448</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18463</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18517</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18534</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18554</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18582</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18642</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18644</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18674</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18675</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18679</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18908</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/18913</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/19230</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/19377</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://secunia.com/advisories/25729</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.472683</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.474747</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2005/dsa-931</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2005/dsa-932</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2005/dsa-937</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2005/dsa-938</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2005/dsa-940</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2006/dsa-936</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2006/dsa-950</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2006/dsa-961</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.debian.org/security/2006/dsa-962</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.kde.org/info/security/advisory-20051207-2.txt</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:003</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:004</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:005</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:006</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:008</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:010</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:011</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:012</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2006-0160.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.redhat.com/support/errata/RHSA-2006-0163.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/427053/100/0/threaded</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/427990/100/0/threaded</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/bid/16143</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.trustix.org/errata/2006/0002/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2006/0047</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.vupen.com/english/advisories/2007/2280</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/24022</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://usn.ubuntu.com/236-1/</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-1">5/13/2024 9:32:27 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-2">10/19/2018 11:37:14 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/427053/100/0/threaded [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/427990/100/0/threaded [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/archive/1/427053/100/0/threaded [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Removed</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://www.securityfocus.com/archive/1/archive/1/427990/100/0/threaded [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-3">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-3">10/03/2018 5:32:13 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Added</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">https://usn.ubuntu.com/236-1/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Removed</td>
<td
data-testid="vuln-change-history-3-type">Reference</td>
<td data-testid="vuln-change-history-3-old">
<pre style="word-break: break-all !important">http://www.ubuntulinux.org/support/documentation/usn/usn-236-1 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-3-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-4">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-4">10/10/2017 9:30:26 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9437 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-5">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-5">7/10/2017 9:33:14 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Added</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
</td>
<td data-testid="vuln-change-history-5-new">
<pre style="word-break: break-all !important">https://exchange.xforce.ibmcloud.com/vulnerabilities/24022 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Removed</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
<pre style="word-break: break-all !important">http://xforce.iss.net/xforce/xfdb/24022 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-5-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-6">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-6">2/19/2017 12:09:52 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Added</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:010 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-7">CVE Modified by Red Hat, Inc.</span> <span
data-testid="vuln-change-history-date-7">11/18/2016 9:59:38 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Removed</td>
<td
data-testid="vuln-change-history-7-type">Reference</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDKSA-2006:010 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-8">Initial CVE Analysis</span> <span
data-testid="vuln-change-history-date-8">5/16/2006 12:14:00 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2005-3624">CVE-2005-3624</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">12/31/2005</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">11/20/2024</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Red Hat, Inc.</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="ZKEH6wWJxXyBJF83dtKpX1mKrjtikS9E8fjkNQ5TMQtYAo71azOMZIwPFNFYflrgSujVUDplpPagyTWVau7DZuvu94JxqjGrMOTl4rpbQFweSYobb7PN726a8OEmPRhFtxPTJmlSiV8sQUmSSMZTLKYqXfomn5qjcQTS5pI7DLN1rTInFwIgdfeCZIR97zilpoEMpAe3lVXYviaIuzeqCb0oFqsfyAq3NRmMgJR49KtTzZgzAevvB4TfNJ6Iyq6XsDgmrBVgygSw7DJRtNLwlmZiq6fWF1MKIOYSbMg45u4g3MhLnFyTtVThhspfqZMjWnS6cZ7WsjMqZANHbqyVCQ2jXXSNB1crqKfURtTFSsvkJ5sNdDq0mg1TY5QrDS3DnlWWUD7qlO4zdZMvvig73bWajftRIIkQEqwxgpB1AfOvU9ZcSzYhJoHfx5s5FHGrUU7OgqVL2xHCdOI32HyDWeCXAjJTiu7pxR2hvvRiDSGBidH0Uzmf8C83lY7GyiEoHkYzlzljes3M8j0W4rsHLLxAV2NwqSJwFUuwmlst6X04UAL8estwP0PEGYx38VUMyTItEpXsG5aTAuWCoiLVUmDBX5bRE5LfX5e8oST9i7MEv3ubrsVGfUZ9qzCLmtREERCq7Sv8u7OzVAKz7v5ElozCptLNnVZimK9065hftcLGKmAb42KDki6ENZVuCt9aULVJMgXlnM6DxqsiQK0IBMoARHA6AroPyIBg6jgMvHhkAWtj1Xwcm91zrEjx9jkPcfDb9Vbd8wONK0WJ1pOBESb6b05mcOygTjuU89TMS9bKvFBeKG0S" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>